Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-5946
Awaiting Analysis
More InfoOfficial Page
Source-security-officer@isc.org
View Known Exploited Vulnerability (KEV) details
Published At-20 May, 2026 | 13:16
Updated At-20 May, 2026 | 14:04

Multiple flaws have been identified in `named` related to the handling of DNS messages whose CLASS is not Internet (`IN`) — for example, `CHAOS` or `HESIOD`, or DNS messages that specify meta-classes (`ANY` or `NONE`) in the question section. Specially crafted requests reaching the affected code paths — recursion, dynamic updates (`UPDATE`), zone change notifications (`NOTIFY`), or processing of `IN`-specific record types in non-`IN` data — can cause assertion failures in `named`. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-20Secondarysecurity-officer@isc.org
CWE-125Secondarysecurity-officer@isc.org
CWE-617Secondarysecurity-officer@isc.org
CWE-754Secondarysecurity-officer@isc.org
CWE-843Secondarysecurity-officer@isc.org
CWE ID: CWE-20
Type: Secondary
Source: security-officer@isc.org
CWE ID: CWE-125
Type: Secondary
Source: security-officer@isc.org
CWE ID: CWE-617
Type: Secondary
Source: security-officer@isc.org
CWE ID: CWE-754
Type: Secondary
Source: security-officer@isc.org
CWE ID: CWE-843
Type: Secondary
Source: security-officer@isc.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://downloads.isc.org/isc/bind9/9.18.49security-officer@isc.org
N/A
https://downloads.isc.org/isc/bind9/9.20.23security-officer@isc.org
N/A
https://downloads.isc.org/isc/bind9/9.21.22security-officer@isc.org
N/A
https://kb.isc.org/docs/cve-2026-5946security-officer@isc.org
N/A
Hyperlink: https://downloads.isc.org/isc/bind9/9.18.49
Source: security-officer@isc.org
Resource: N/A
Hyperlink: https://downloads.isc.org/isc/bind9/9.20.23
Source: security-officer@isc.org
Resource: N/A
Hyperlink: https://downloads.isc.org/isc/bind9/9.21.22
Source: security-officer@isc.org
Resource: N/A
Hyperlink: https://kb.isc.org/docs/cve-2026-5946
Source: security-officer@isc.org
Resource: N/A
Change History
0Changes found

Details not found