CVE-2026-3119

Severity
6.5MEDIUM
EPSS
0.0%
top 96.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25

Description

Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

Alpinebind< 9.20.21-r0+1
Debianbind9< 1:9.20.21-1~deb13u1+1
CVEListV5isc/bind_99.20.09.20.20+2

🔴Vulnerability Details

4
CVEList
Authenticated query containing a TKEY record may cause named to terminate unexpectedly2026-03-25
OSV
CVE-2026-3119: Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record2026-03-25
GHSA
GHSA-rrrp-782c-4484: Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record2026-03-25
OSV
CVE-2026-3119: Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record2026-03-25

📋Vendor Advisories

4
Red Hat
bind: BIND: Denial of Service via authenticated TKEY queries2026-03-25
Ubuntu
Bind vulnerabilities2026-03-25
Microsoft
Authenticated query containing a TKEY record may cause named to terminate unexpectedly2026-03-10
Debian
CVE-2026-3119: bind9 - Under certain conditions, `named` may crash when processing a correctly signed q...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-3119 Impact, Exploitability, and Mitigation Steps | Wiz