BIND 9 Assertion Failure: CVE-2026-5946 Impacts DNS Handling

BIND 9 Assertion Failure: CVE-2026-5946 Impacts DNS Handling

Multiple critical flaws, tracked as CVE-2026-5946, have been identified in named, the daemon for BIND 9. According to the National Vulnerability Database, these issues stem from improper handling of DNS messages not using the Internet (IN) class, such as CHAOS or HESIOD. Additionally, problems arise with DNS messages that specify meta-classes like ANY or NONE in the question section.

Specially crafted requests targeting code paths for recursion, dynamic updates (UPDATE), zone change notifications (NOTIFY), or processing of IN-specific record types in non-IN data can trigger assertion failures. This leads to named crashing. The National Vulnerability Database rates this with a CVSSv3.1 score of 7.5 (HIGH), indicating a significant availability risk.

The vulnerability impacts a wide range of BIND 9 versions: 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, and their corresponding 9.11.3-S1, 9.18.11-S1, and 9.20.9-S1 extended support editions. Defenders must prioritize patching to maintain DNS service availability against denial-of-service attacks.

What This Means For You

  • If your organization relies on BIND 9, you are directly exposed to a denial-of-service risk. Attackers can crash your `named` service with specially crafted DNS queries. Identify all BIND 9 instances in your environment and apply the latest security patches immediately. This isn't theoretical; an assertion failure means your DNS resolver goes down, impacting all services that rely on it.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

BIND 9 Assertion Failure due to Non-Internet CLASS DNS Query - CVE-2026-5946

Sigma YAML — free preview
title: BIND 9 Assertion Failure due to Non-Internet CLASS DNS Query - CVE-2026-5946
id: scw-2026-05-20-ai-1
status: experimental
level: high
description: |
  Detects specially crafted DNS queries targeting BIND 9 that use non-Internet CLASS types (e.g., CHAOS, HESIOD) or meta-classes (ANY, NONE) in the question section. This specific pattern is indicative of an attempt to trigger the assertion failures described in CVE-2026-5946, potentially leading to a denial of service or further exploitation.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-5946/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: dns
detection:
  selection:
      query|contains:
          - 'CHAOS'
          - 'HESIOD'
          - 'ANY'
          - 'NONE'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-5946 Vulnerability CVE-2026-5946
CVE-2026-5946 Affected Product BIND 9
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 16:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma