<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5946 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5946/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 13:19:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5946/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-5946: BIND 9 `named` Assertion Failure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5946-bind9-assertion-failure/</link><pubDate>Wed, 20 May 2026 13:19:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5946-bind9-assertion-failure/</guid><description>Multiple flaws in BIND 9's `named` component, specifically versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1, can be exploited by sending specially crafted DNS requests with non-`IN` CLASS or meta-classes, leading to assertion failures and potential denial-of-service.</description><content:encoded><![CDATA[<p>CVE-2026-5946 identifies multiple vulnerabilities within the <code>named</code> component of BIND 9, arising from improper handling of DNS messages employing a CLASS other than Internet (<code>IN</code>), such as <code>CHAOS</code> or <code>HESIOD</code>, or DNS messages with meta-classes (<code>ANY</code> or <code>NONE</code>) in the question section. An attacker can trigger these flaws by sending specially crafted DNS requests to a vulnerable BIND 9 server. The affected code paths include recursion, dynamic updates (<code>UPDATE</code>), zone change notifications (<code>NOTIFY</code>), and processing of <code>IN</code>-specific record types within non-<code>IN</code> data. Successful exploitation can lead to assertion failures in <code>named</code>, potentially causing a denial-of-service condition. The vulnerability impacts BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable BIND 9 server.</li>
<li>The attacker crafts a malicious DNS request. This request leverages a DNS CLASS other than <code>IN</code>, such as <code>CHAOS</code>, or includes meta-classes such as <code>ANY</code> or <code>NONE</code> in the question section.</li>
<li>The attacker sends the crafted DNS request to the target BIND 9 server.</li>
<li>The <code>named</code> process receives and parses the malicious DNS request.</li>
<li>Due to the unexpected CLASS or meta-class, the <code>named</code> process enters a vulnerable code path during recursion, dynamic updates, zone change notifications, or processing of <code>IN</code>-specific record types in non-<code>IN</code> data.</li>
<li>Within the vulnerable code path, the <code>named</code> process attempts an invalid operation based on the malicious request.</li>
<li>This invalid operation triggers an assertion failure within the <code>named</code> process.</li>
<li>The assertion failure may cause the <code>named</code> process to terminate or become unstable, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5946 leads to assertion failures within the <code>named</code> process, causing potential instability or termination of the service. This results in a denial-of-service condition, disrupting DNS resolution services for affected networks and users. The severity of the impact depends on the role of the affected BIND 9 server; critical infrastructure DNS servers experiencing this issue can cause widespread outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade BIND 9 to a patched version (&gt;= 9.16.51, &gt;= 9.18.49, &gt;= 9.20.23, &gt;= 9.21.22) to remediate CVE-2026-5946.</li>
<li>Deploy the Sigma rule &ldquo;Detect DNS queries with non-IN class&rdquo; to identify potentially malicious DNS requests targeting this vulnerability.</li>
<li>Monitor DNS server logs for assertion failures in the <code>named</code> process, which may indicate exploitation attempts related to CVE-2026-5946.</li>
<li>Consider implementing rate limiting and request filtering to mitigate the impact of malicious DNS requests.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>dns</category><category>bind9</category><category>CVE-2026-5946</category></item></channel></rss>