CVE-2026-33608
Configuration Injection in Bind Backend Causes Service Downtime
Publication date: 2026-04-22
Last updated on: 2026-04-24
Assigner: Open-Xchange
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| powerdns | authoritative | From 4.9.0 (inc) to 4.9.14 (exc) |
| powerdns | authoritative | From 5.0.0 (inc) to 5.0.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an attacker to send a notify request that adds a new secondary domain to the bind backend.
However, this action causes the backend to update its configuration to an invalid state.
As a result, the backend will fail to run on the next restart and will require manual intervention to fix the configuration.
How can this vulnerability impact me? :
The impact of this vulnerability is that the bind backend service will become non-functional after a restart due to an invalid configuration.
This disruption requires manual operation to restore service, potentially causing downtime and operational overhead.