An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
Title Incomplete domain name sanitization during
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-04-22T14:28:15.172Z

Reserved: 2026-03-23T12:58:38.267Z

Link: CVE-2026-33608

cve-icon Vulnrichment

Updated: 2026-04-22T14:27:55.851Z

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:54.650

Modified: 2026-04-22T15:16:13.857

Link: CVE-2026-33608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses