Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
- Last update: 31/03/2026
- Affected software:
→ ISC BIND 9- Type:
→ CWE-772: Missing Release of Resource after Effective Lifetime
→ CWE-606: Unchecked Input for Loop Condition- CVE/CVSS
→ CVE-2026-3104: CVSS 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
→ CVE-2026-1519: CVSS 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
ISC - https://kb.isc.org/docs/cve-2026-3104
ISC - https://kb.isc.org/docs/cve-2026-1519
The Internet Systems Consortium (ISC) patched several vulnerabilities in ISC BIND 9, a widely used DNS server software. DNS is the backbone of nearly all network services and if it goes down, email, websites, authentication, and cloud applications all stop working.
CVE-2026-3104 and CVE-2026-1519 are two high-severity vulnerabilities (CVSS 7.5). Both flaws allow a remote attacker to cause a denial of service without any authentication, simply by sending crafted DNS queries. ISC is not aware of any active exploitation in the wild. These are not zero-days, patches were available at disclosure. No public proof-of-concept code has been reported.
CVE-2026-3104: Memory Leak (High)
A specially crafted domain causes a memory leak in BIND resolvers through the DNSSEC proof-of-non-existence code. Memory is never freed, leading to out-of-memory conditions. Affects BIND 9.20.0 -> 9.20.20 and 9.21.0 -> 9.21.19. No workarounds known.
CVE-2026-1519: CPU Exhaustion (High)
Maliciously crafted zones with excessive NSEC3 iterations cause high CPU load during DNSSEC validation. Affects BIND 9.11.0 through 9.21.19 across all branches. Workaround: disabling DNSSEC validation prevents exploitation but is not recommended: (dnssec-validation no;).
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
Monitor DNS resolvers for abnormal memory growth or CPU spikes.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-3104
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-1519