The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-25220

CVE-2021-25220: ISC BIND DNS Cache Poisoning Vulnerability

CVE-2021-25220 is a cache poisoning vulnerability in ISC BIND that allows incorrect records to contaminate the cache, directing queries to wrong servers. This article covers the technical details, affected versions, and mitigation.

Published: February 25, 2026

CVE-2021-25220 Overview

CVE-2021-25220 is a DNS cache poisoning vulnerability affecting ISC BIND 9, one of the most widely deployed DNS server software packages. The vulnerability allows the DNS resolver cache to become poisoned with incorrect records, which can lead to DNS queries being directed to malicious or unintended servers. This could result in false information being returned to clients, potentially enabling man-in-the-middle attacks, redirection to malicious sites, or disruption of legitimate network services.

The vulnerability affects a broad range of BIND 9 versions including 9.11.0 through 9.11.36, 9.12.0 through 9.16.26, and 9.17.0 through 9.18.0. Additionally, BIND Supported Preview Editions from 9.11.4-S1 through 9.11.36-S1 and 9.16.8-S1 through 9.16.26-S1 are impacted. ISC notes that versions earlier than those listed, going back to 9.1.0, are also believed to be affected but have not been tested as they have reached end-of-life status.

Critical Impact

DNS cache poisoning can redirect users and applications to attacker-controlled servers, enabling data interception, credential theft, and delivery of malicious content without detection by end users.

Affected Products

  • ISC BIND 9.11.0 through 9.11.36, 9.12.0 through 9.16.26, 9.17.0 through 9.18.0
  • BIND Supported Preview Editions 9.11.4-S1 through 9.11.36-S1 and 9.16.8-S1 through 9.16.26-S1
  • Fedora 34, 35, and 36
  • NetApp H-Series firmware (H300S, H500S, H700S, H300E, H500E, H700E, H410S, H410C)
  • Siemens SINEC INS
  • Juniper Junos OS on SRX Series devices

Discovery Timeline

  • 2022-03-23 - CVE-2021-25220 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-25220

Vulnerability Analysis

This vulnerability relates to how BIND 9 handles DNS response processing and caching when operating as a forwarding resolver. The flaw is classified under CWE-444 (Inconsistent Interpretation of HTTP Requests), though in this DNS context it manifests as inconsistent interpretation of DNS responses that can lead to cache contamination.

When a BIND resolver configured with forwarders receives DNS responses, the software may improperly cache records that should be rejected or validated more strictly. This allows an attacker who can influence DNS responses—either by controlling an upstream DNS server or through network position—to inject malicious records into the resolver's cache. These poisoned cache entries are then served to clients making queries to the affected resolver.

The attack is particularly dangerous in enterprise environments where internal resolvers serve many clients, as a single cache poisoning event can affect all downstream users. The scope of impact extends beyond the vulnerable component itself, as clients relying on the poisoned resolver receive incorrect DNS information without any indication of compromise.

Root Cause

The root cause lies in insufficient validation of DNS response data when the resolver processes answers from forwarders. BIND's caching logic fails to adequately verify that response records are authoritative and legitimate for the queried domain, allowing forged or manipulated records to be stored in the cache. This is especially problematic in configurations using the forward only directive, where the resolver depends entirely on upstream forwarders for DNS resolution.

Attack Vector

An attacker can exploit this vulnerability through network-based attacks without requiring authentication. The exploitation scenario typically involves:

  1. Positioning: The attacker gains ability to influence DNS responses reaching the target BIND resolver, either by compromising an upstream forwarder, performing network interception, or controlling a malicious authoritative server
  2. Response Manipulation: Crafted DNS responses containing malicious record mappings are sent to the vulnerable resolver
  3. Cache Injection: The resolver caches the poisoned records without proper validation
  4. Client Impact: All clients querying the compromised resolver receive the attacker's forged DNS responses, potentially for an extended period based on TTL values

The attack does not require user interaction and can be performed remotely. While high privileges are needed to position the attack (controlling upstream DNS infrastructure), the impact crosses security boundaries by affecting all clients of the poisoned resolver.

Detection Methods for CVE-2021-25220

Indicators of Compromise

  • Unexpected DNS resolution results where legitimate domains resolve to unfamiliar IP addresses
  • Cache entries pointing to IP addresses not associated with the expected authoritative DNS servers
  • Anomalous DNS response patterns from configured forwarders showing inconsistent or suspicious records
  • Client systems connecting to unexpected servers after DNS lookups for known services

Detection Strategies

  • Monitor DNS resolver cache contents for entries that map well-known domains to suspicious IP addresses
  • Implement DNS response validation tools that compare resolver answers against authoritative sources
  • Deploy network monitoring to detect DNS traffic patterns indicative of cache poisoning attempts
  • Audit BIND configuration for forward only directives which increase susceptibility to this vulnerability

Monitoring Recommendations

  • Enable verbose query logging on BIND resolvers to track DNS resolution patterns and identify anomalies
  • Implement DNSSEC validation where possible to cryptographically verify DNS response authenticity
  • Monitor resolver performance metrics for unusual cache hit/miss ratios that could indicate cache manipulation
  • Set up alerts for DNS responses from forwarders containing records for domains outside expected zones

How to Mitigate CVE-2021-25220

Immediate Actions Required

  • Upgrade ISC BIND to patched versions: 9.11.37, 9.16.27, 9.18.1, or later releases as specified in the ISC advisory
  • Review and restrict forwarder configurations to trusted upstream DNS servers only
  • Enable DNSSEC validation to provide cryptographic verification of DNS responses
  • Implement network segmentation to limit exposure of internal DNS resolvers

Patch Information

ISC has released security updates to address this vulnerability. Administrators should upgrade to BIND 9.11.37, 9.16.27, 9.18.1, or later versions. For Supported Preview Editions, upgrade to 9.11.37-S1 or 9.16.27-S1. Detailed patch information and upgrade guidance is available in the ISC CVE-2021-25220 advisory.

Additional vendor-specific patches are available:

  • Siemens Security Advisory SSA-637483 for SINEC INS
  • Juniper Security Bulletin for Junos OS SRX Series
  • NetApp Security Advisory NTAP-20220408 for affected NetApp products

Workarounds

  • Configure BIND to avoid using forwarders if direct recursive resolution is feasible for your environment
  • Implement strict network access controls limiting which systems can send DNS responses to your resolver
  • Deploy DNS firewalling solutions to filter suspicious DNS responses before they reach the resolver
  • Consider implementing split-horizon DNS to reduce attack surface for internal zone resolution
bash
# Example: BIND configuration to enable DNSSEC validation
# Add to named.conf options block
options {
    dnssec-validation auto;
    dnssec-enable yes;
    
    # Restrict forwarders to trusted servers only
    forwarders {
        192.0.2.1;  # Trusted upstream DNS 1
        192.0.2.2;  # Trusted upstream DNS 2
    };
    
    # Limit who can query this resolver
    allow-query { 
        localhost; 
        192.168.0.0/16; 
    };
};

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechIsc Bind

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-444
  • Technical References
  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 202210-25

  • NetApp Security Advisory NTAP-20220408

  • Juniper Security Bulletin CVE-2021-25220
  • Vendor Resources
  • Siemens Security Advisory SSA-637483

  • ISC CVE-2021-25220 Details
  • Related CVEs
  • CVE-2023-50868: ISC BIND DNSSEC DoS Vulnerability

  • CVE-2023-3341: ISC BIND Denial of Service Vulnerability

  • CVE-2022-38177: ISC BIND DOS Vulnerability

  • CVE-2023-4408: Netapp Ontap DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English