CVE-2026-3592
Description
BIND resolvers are vulnerable to an amplified resource consumption/exhaustion attack. If a victim resolver makes a query to a specially crafted zone, the resolver will consume disproportionate resources. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
BIND 9 resolvers are vulnerable to an amplified resource consumption/exhaustion attack via self-pointed glue records, potentially causing disproportionate resource consumption and TCP impairment.
Vulnerability
The vulnerability exists in BIND 9 recursive resolvers when they query a specially crafted zone containing self-pointed glue records. Resolvers may consume disproportionate resources, including bandwidth and CPU, attempting to resolve such names. The issue affects BIND versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, and the corresponding Supported Preview Edition versions [1].
Exploitation
An attacker must host a malicious zone and cause a victim resolver to query it (e.g., by sending a query for a domain within that zone). No authentication is required, and the attack can be launched remotely over the network [1]. The resolver will attempt to resolve the name by following self-pointed glue records, leading to excessive resource consumption.
Impact
Successful exploitation allows an attacker to cause the resolver to consume disproportionate amounts of bandwidth and possibly impair TCP connections, resulting in a denial-of-service condition. The vulnerability does not allow data confidentiality or integrity compromise [1].
Mitigation
ISC has released patched versions: BIND 9.18.49, 9.20.23, and 9.21.22 (and S-Preview equivalents 9.18.49-S1, 9.20.23-S1). Users should upgrade to the appropriate fixed version [1],[2],[3],[4]. No workarounds are available. Authoritative-only servers with trusted zones are not affected [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: >=9.11.0,<=9.16.50 || >=9.18.0,<=9.18.48 || >=9.20.0,<=9.20.22 || >=9.21.0,<=9.21.21 || >=9.11.3-S1,<=9.16.50-S1 || >=9.18.11-S1,<=9.18.48-S1 || >=9.20.9-S1,<=9.20.22-S1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.