PatchSiren

ISC CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH ISC CVE published 2026-05-20

CVE-2026-5946

CVE-2026-5946 is a high-severity availability issue in BIND 9's named process. According to the NVD record and ISC references, specially crafted DNS traffic using non-IN classes (for example, CHAOS, HESIOD, ANY, or NONE) can reach code paths such as recursion, dynamic updates, NOTIFY handling, or IN-specific record processing in non-IN data and trigger assertion failures.

MEDIUM ISC CVE published 2026-05-20

CVE-2026-3592

CVE-2026-3592 is an availability issue in BIND recursive resolvers. According to NVD and ISC references, a victim resolver that queries a specially crafted zone can consume disproportionate resources, creating an amplified resource consumption or exhaustion condition. The published affected range spans multiple BIND 9 branches, including 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20. [truncated]

HIGH ISC CVE published 2026-05-20

CVE-2026-3039

CVE-2026-3039 is a denial-of-service vulnerability in ISC BIND when a server is configured to use TKEY-based authentication via GSS-API tokens. Maliciously constructed packets can trigger excessive memory consumption, which is particularly relevant in Active Directory-integrated DNS and Kerberos-secured DNS environments. NVD lists the issue as CVSS 3.1 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

HIGH ISC CVE published 2025-04-07

CVE-2023-3341

CVE-2023-3341 is a high-severity denial-of-service issue affecting ABB M2M Gateway products, including ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3. According to the CISA advisory, a remote attacker with network access to the control channel's configured TCP port can trigger recursive processing in named, exhaust stack memory, and cause the service to te [truncated]

MEDIUM ISC CVE published 2025-04-07

CVE-2023-2828

CVE-2023-2828 is a denial-of-service issue in ABB M2M Gateway ARM600 and ABB M2M Gateway SW. According to the supplied CISA/ABB advisory, querying the resolver for specific RRsets in a certain order can make the configured max-cache-size limit be significantly exceeded, which may exhaust host memory and disrupt the named service. ABB also states that ARM600 is not dependent on DNS by default, and recommen [truncated]

HIGH ISC CVE published 2025-04-07

CVE-2022-38178

CVE-2022-38178 is a high-severity availability issue in ABB M2M Gateway products. According to the CISA CSAF advisory, an attacker who can spoof the target resolver and send responses with a malformed EdDSA signature can trigger a small memory leak. Repeated triggering may gradually exhaust memory until named crashes for lack of resources. The supplied advisory also notes a practical mitigation: if name s [truncated]

HIGH ISC CVE published 2025-04-07

CVE-2022-38177

CVE-2022-38177 is an availability-focused vulnerability in ABB M2M Gateway products. According to the CISA CSAF advisory, an attacker who can spoof the target resolver with malformed ECDSA signature responses can trigger a small memory leak; repeated abuse may gradually consume memory until named crashes from lack of resources. The advisory published on 2025-04-07 identifies affected ABB M2M Gateway ARM60 [truncated]

MEDIUM ISC CVE published 2025-04-07

CVE-2021-25220

CVE-2021-25220 is a DNS trust issue in ABB M2M Gateway ARM600 and ABB M2M Gateway SW. According to the CISA/ABB advisory, when forwarders are used, bogus NS records supplied by or through those forwarders may be cached and later reused by named if it needs to recurse, which can lead to incorrect DNS answers. The advisory says this can result in DNS cache poisoning and may cause denial of service or inform [truncated]