Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1845 articles · 106883 vulns · 38/55 feeds (7d)
← Back to list
5.4
CVE-2026-3591EXPLOITED

A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass

Description

A use-after-return vulnerability exists in the `named` server when handling DNS queries signed with SIG(0). Using a specially-crafted DNS request, an attacker may be able to cause an ACL to improperly (mis)match an IP address. In a default-allow ACL (denying only specific IP addresses), this may lead to unauthorized access. Default-deny ACLs should fail-secure. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

Affected Products

VendorProductVersions
ISCBIND 99.20.0, 9.21.0, 9.20.9-S1, 9.18.45, 9.21.20, 9.11.0, 9.11.3-S1, 9.16.50, 9.16.50-S1

References

  • https://kb.isc.org/docs/cve-2026-3591(vendor-advisory)
  • https://downloads.isc.org/isc/bind9/9.20.21(patch)
  • https://downloads.isc.org/isc/bind9/9.21.20(patch)

Related News (3 articles)

Tier B
CCCS Canada3h ago
ISC BIND security advisory (AV26-280)
→ No new info (linked only)
Tier C
oss-security6h ago
ISC has disclosed four vulnerabilities in BIND 9 (CVE-2026-1519, CVE-2026-3104, CVE-2026-3119, CVE-2026-3591)
→ No new info (linked only)
Tier C
VulDB7h ago
CVE-2026-3591 | ISC BIND prior 9.20.21/9.21.20 named return of stack variable address
→ No new info (linked only)
CVSS 3.15.4 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-562, CWE-305, CWE-20
Published3/25/2026
Last enriched3h agov3
Tags
security advisory
Trending Score55
Source articles5
Independent3
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v3
Last enriched 3h ago
v3Tier B3h ago

Updated affected versions, marked exploit as available, added new CWE, and included new tags.

affectedVersionsexploitAvailablecweIdstags
via CCCS Canada
v2Tier C6h ago

Updated severity to CRITICAL, added new affected versions, and noted that the vulnerability is actively exploited.

severityaffectedVersionsactivelyExploitedpatchAvailable
via VulDB
v17h ago

Initial creation