CVE-2026-3593 DoH in BIND 9: Patch Urgently or Disable DNS-over-HTTPS

CVE-2026-3593 is a high-severity heap use-after-free vulnerability disclosed on May 20, 2026, in the DNS-over-HTTPS implementation of BIND 9, affecting BIND 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, and the supported preview 9.20.9-S1 through 9.20.22-S1. ISC says crafted HTTP/2 traffic sent to a DNS-over-HTTPS endpoint can trigger memory corruption, and both authoritative servers and resolvers are affected when DoH is enabled. The immediate fix is to move to BIND 9.20.23, BIND 9.21.22, or 9.20.23-S1, while disabling DoH remains the practical workaround for operators who cannot patch at once.
The important word in that paragraph is not heap, or even use-after-free. It is endpoint. CVE-2026-3593 does not describe a bug in the abstract DNS machinery that every BIND deployment exposes by default; it describes a bug in a newer transport path that many operators adopted to put DNS inside the same encrypted web stack that now carries almost everything else. That distinction should shape the response: urgent for exposed DoH services, less dramatic for shops that never turned the feature on, and another warning that every “modernized” protocol surface carries operational debt as well as privacy gains.

Security advisory graphic warning of BIND 9 DoH heap use-after-free vulnerability and required upgrade/disable.BIND’s DoH Bug Turns a Privacy Feature Into an Availability Problem​

DNS-over-HTTPS was sold, fairly, as a way to make DNS look less like a postcard and more like modern web traffic. Instead of sending classic DNS queries in the clear over UDP or TCP, clients send DNS queries through HTTPS, usually riding HTTP/2 or HTTP/3 semantics and inheriting the encryption, authentication, and middlebox-resistance of the web. For users, that can mean less passive observation by local networks. For operators, it means DNS becomes part of a larger HTTP service model.
CVE-2026-3593 is a reminder that this model is not free. BIND’s advisory describes a use-after-free in the DoH implementation, reachable through crafted HTTP/2 traffic aimed at a DNS-over-HTTPS endpoint. That is not a theoretical neatness problem for language lawyers; it is the kind of memory-lifetime mistake that can destabilize a daemon handling one of the few services users notice only when it is broken.
ISC rates the issue high, with a CVSS 3.1 score of 7.4. NVD’s enrichment, at least at publication time, listed a more severe 9.8 critical score, apparently treating the attack complexity and impact differently. That disagreement is not unusual in the CVE ecosystem, but administrators should resist the temptation to turn the score debate into a patching debate. The operational question is simpler: if a BIND server exposes DoH on an affected version, it is in scope.
The vulnerability’s practical availability angle is the one most likely to matter first. The user-supplied MSRC description frames the impact as a total loss of availability: an attacker can deny access to resources in the impacted component, either while the attack continues or through a condition that persists afterward. ISC’s own advisory says the crafted traffic can trigger memory corruption, and memory corruption in a network-facing daemon is exactly the sort of failure domain DNS teams have spent decades trying to isolate.

The Affected Versions Tell a More Specific Story Than the CVE Score​

The vulnerable range is narrow enough to be useful but broad enough to catch many current operators. BIND 9.20.0 through 9.20.22 and 9.21.0 through 9.21.21 are affected, as is the supported preview edition from 9.20.9-S1 through 9.20.22-S1. The fixed versions are BIND 9.20.23, 9.21.22, and 9.20.23-S1.
Just as important, ISC says BIND 9.18.0 through 9.18.48 and the supported preview 9.18.11-S1 through 9.18.48-S1 are not affected. That will matter in conservative environments where the long-supported branch remains the default choice. It also complicates simplistic vulnerability scanning that flags “BIND 9” without correctly parsing the branch, build, and enabled features.
The branch split should make administrators cautious about both panic and complacency. A server on 9.18 with no affected DoH code path is not the same as a 9.20 resolver advertising a DoH endpoint to the internet. Conversely, a server on a vulnerable branch should not be treated as safe merely because it is “just DNS.” The bug sits at the junction where DNS has been deliberately wrapped in web transport.
Older versions before 9.18 were not assessed, according to ISC. That is a polite way of saying they do not belong in the comfort zone. If an estate still contains unmaintained BIND builds, CVE-2026-3593 should not become a forensic exercise in whether one obsolete deployment is technically vulnerable. It should become one more reason to remove unsupported DNS infrastructure from production.

HTTP/2 Makes the Attack Surface Feel Familiar, Not Safer​

The detail that crafted HTTP/2 traffic is involved may lead some teams to underestimate the risk. HTTP/2 is familiar, widely deployed, and usually associated with web servers, reverse proxies, and content delivery infrastructure. But familiarity is not a security boundary. When DNS is exposed through HTTPS, the DNS daemon or its fronting stack must parse and react to a class of traffic that did not exist in traditional port 53 deployments.
That matters because use-after-free vulnerabilities are usually about state. Something is allocated, referenced, released, and then referenced again under conditions the software did not correctly anticipate. HTTP/2, with multiplexed streams and more complex connection behavior than old request-response HTTP, gives protocol implementations a rich state machine to get wrong.
This does not mean HTTP/2 is inherently unsafe or that DoH was a mistake. It means that adding web transports to infrastructure services expands the number of parser states, connection states, timeout states, and cleanup paths that must be correct. The bug is not an indictment of encrypted DNS. It is an indictment of treating encrypted DNS as merely “DNS plus TLS” when, operationally, it is DNS plus an HTTP stack plus all the failure modes that come with long-lived modern web connections.
For WindowsForum readers, the most relevant analogy is not Windows DNS Server itself but the recurring pattern across platform security: features that reduce one risk often import another. SMB hardening changed legacy file-sharing assumptions. RDP security improvements changed exposure management. DoH reduces passive DNS visibility on hostile networks, but it also moves DNS into an application-layer ecosystem where HTTP bugs become DNS availability bugs.

Microsoft’s Listing Matters Even When the Bug Is Not a Windows DNS Bug​

The MSRC listing is easy to misread. CVE-2026-3593 is not, based on the public advisory, a vulnerability in Microsoft’s Windows DNS Server role. It is a BIND 9 vulnerability assigned by ISC, and the remediation points to ISC’s patched BIND releases. Microsoft’s Security Update Guide is part of the broader vulnerability information supply chain, not necessarily proof that a Windows component contains the flaw.
That distinction is important in mixed environments. Many enterprises run Windows Server for Active Directory-integrated DNS internally while using BIND for external authoritative zones, lab networks, split-horizon designs, appliances, managed DNS platforms, or resolver infrastructure. A Windows administrator may therefore see the CVE in a Microsoft feed even though the vulnerable software lives on Linux, BSD, a container image, a network appliance, or a vendor-managed DNS service.
The right response is inventory, not brand reflex. If your organization operates BIND directly, check the version and the DoH configuration. If a vendor operates BIND on your behalf, ask whether their service exposes DoH through affected versions and whether they have deployed ISC’s fixed builds. If your environment uses only Microsoft DNS Server and no BIND-based products or services, this CVE is probably not your patch Tuesday emergency — but it may still affect a dependency you rely on.
MSRC’s presence in the story also reflects a reality of modern vulnerability management: security advisories increasingly cross vendor borders. A Windows shop can be affected by an ISC bug, an OpenSSL bug, a curl bug, or a Kubernetes bug without ever thinking of itself as a “Linux shop.” The software supply chain has made those old identity labels less useful than they once were.

The Denial-of-Service Risk Is More Concrete Than the Exploit Drama​

There is no public indication from ISC that active exploitation was known at disclosure. That should lower the temperature, but it should not lower the priority for exposed services. DoH endpoints are network reachable by design, and the advisory says no privileges or user interaction are required. Even with high attack complexity in ISC’s scoring, a remotely reachable memory corruption bug in DNS infrastructure deserves prompt action.
Availability is not a second-tier security property for DNS. When DNS fails, authentication can fail, mail routing can fail, VPN connections can fail, software update checks can fail, monitoring systems can misdiagnose outages, and users experience the internet as “down” even when the underlying network path is alive. DNS outages are also noisy in the worst possible way: everyone notices, but not everyone can immediately tell whether the cause is upstream, local, recursive, authoritative, or application-specific.
The advisory’s confidentiality score is also notable. ISC’s vector includes high confidentiality impact and high availability impact, with no integrity impact. That combination should keep defenders from framing the issue solely as a crash bug. Memory corruption can have different consequences depending on platform, compiler hardening, allocator behavior, configuration, and the reachable code path. The public guidance is patch or disable DoH, not wait for a prettier exploit classification.
The safer editorial line is this: treat CVE-2026-3593 as an availability risk with uncomfortable memory-corruption properties. Do not claim remote code execution unless further evidence appears. Do not dismiss it as “just DoS” if your DNS service is a critical dependency. In infrastructure, “just DoS” can be the whole outage.

The Workaround Is Straightforward, but the Trade-Off Is Not​

ISC says configurations not using DNS-over-HTTPS should not be affected, and disabling DoH is an effective workaround. That is unusually clean as workarounds go. There is no need to invent packet filters around a fragile pattern or rewrite application behavior at midnight if the exposed feature can simply be turned off until patched.
But disabling DoH is not costless in every environment. Some organizations adopted it to serve privacy-conscious clients, to standardize encrypted DNS transport, to support browser or endpoint policies, or to meet architecture goals around encrypted service access. Rolling it back may break assumptions in client configuration, monitoring, or service-level agreements. The workaround is technically simple; the change-management discussion may not be.
For most administrators, the decision tree is still obvious. Patch if you can. Disable DoH if you cannot patch quickly. If neither is immediately possible, reduce exposure aggressively: restrict who can reach the DoH endpoint, inspect front-end proxy behavior, and watch for abnormal HTTP/2 traffic patterns and resolver instability. That is not as clean as upgrading, but it is better than leaving an internet-facing endpoint untouched because the service name happens to be “DNS.”
The more interesting operational lesson is that DoH deserves to be tracked as a first-class service, not a checkbox buried inside DNS configuration. If your monitoring knows about named but not the HTTPS endpoint in front of it, you do not really monitor the service users hit. If your inventory records “BIND” but not “BIND with DoH enabled,” it is not detailed enough for modern vulnerability response.

Authoritative and Recursive Operators Share the Blast Radius​

ISC explicitly says both authoritative servers and resolvers are affected. That matters because the two roles tend to live in different parts of the mental map. Authoritative DNS is public-facing infrastructure that answers for zones. Recursive DNS is often thought of as a client-side dependency, serving employees, customers, or internal systems. DoH blurs the exposure story because either role may present an HTTPS endpoint.
For authoritative operators, the risk is service reachability. If the server answering for public zones becomes unstable, users may not be able to resolve names even though the web servers, mail servers, and applications behind those names are healthy. Redundancy helps, but only if the same vulnerable configuration is not cloned across every node in the fleet.
For recursive operators, the risk can be more subtle. An attacker who can reach the DoH interface may be able to destabilize the resolver service that many clients depend on for all lookups. If the organization has pushed DoH clients toward a small number of central resolvers, the privacy architecture may also have created a concentrated failure point.
This is where traditional DNS engineering still earns its keep. Diversity of versions, staged rollout, multiple resolver pools, health checks, and disciplined failover remain as important as ever. Encrypted transports change the packet shape; they do not repeal the old rule that DNS needs boring, redundant, well-tested infrastructure.

Patch Management Has to Follow the Transport, Not the Package Name​

The fastest way to mishandle this CVE is to search a CMDB for “BIND,” patch a few obvious Linux servers, and call it done. BIND can appear in places that are not maintained by the central server team: containers, lab resolvers, development appliances, embedded network products, managed hosting environments, and vendor-supplied DNS stacks. DoH can also be terminated or proxied in ways that make the real exposure less obvious from outside.
Administrators should start with three facts: the BIND version, whether DoH is enabled, and whether the DoH endpoint is reachable by untrusted clients. A vulnerable version with DoH disabled is not the same risk as a vulnerable internet-facing DoH resolver. A patched version behind a misconfigured front end is not the same as a patched service verified end to end. The transport path matters.
Linux distribution packages may also lag or backport fixes in ways that confuse version-based checks. A distro may ship a package with a vendor version string that does not exactly match ISC’s upstream tarball while still carrying the patch, or it may take time to publish an update. That is why vulnerability management teams should check distribution security notices, package changelogs, and actual service behavior rather than relying on one scanner field.
Windows-heavy shops have a special blind spot here. If DNS is mostly associated with domain controllers, teams may forget that public authoritative DNS or encrypted resolver services live elsewhere. CVE-2026-3593 is a good excuse to map the boundary between Microsoft DNS, BIND, cloud DNS, and third-party resolver services before the next vulnerability forces that exercise under worse conditions.

The CVSS Disagreement Is a Symptom of a Bigger Scoring Problem​

The split between ISC’s high score and NVD’s critical score is not just bureaucratic noise. It shows how much interpretation goes into vulnerability scoring, especially when memory corruption is involved but public exploitation details are limited. One scorer may emphasize attack complexity and the advisory’s stated impact. Another may assign lower complexity or broader confidentiality, integrity, and availability consequences based on the generic weakness pattern.
For defenders, the lesson is not that one score is “right” and the other is “wrong.” The lesson is that CVSS compresses too many operational variables into a number. A vulnerable DoH endpoint serving a small internal lab is not equivalent to a globally exposed resolver serving production clients, even if the CVE identifier is the same. A server protected by restrictive network policy is not equivalent to a public service advertised to any browser or stub resolver.
The industry has spent years teaching administrators to sort patch queues by severity. That is understandable because the queue is too large to treat every CVE as equal. But infrastructure bugs need another dimension: dependency centrality. DNS sits high in that ranking. A high-severity DNS availability bug may outrank a critical bug in a rarely used desktop component, because the blast radius of failure is different.
CVE-2026-3593 is therefore a case study in contextual prioritization. If you do not run affected BIND DoH, the issue falls away. If you do, the advisory should move quickly through emergency change or accelerated maintenance, regardless of whether the score on one dashboard says 7.4 or 9.8.

DoH’s Security Politics Should Not Distract From the Engineering​

DNS-over-HTTPS has always carried a political charge. Browser vendors, operating system vendors, ISPs, enterprise administrators, and privacy advocates have argued for years over who should control DNS resolution, who should be able to observe it, and whether encrypted DNS centralizes too much power in too few providers. Those arguments are real, but CVE-2026-3593 is not usefully reduced to a culture-war point for or against DoH.
Privacy features can contain exploitable bugs. Legacy protocols can contain exploitable bugs. The existence of a vulnerability in one BIND DoH implementation does not prove that encrypted DNS is misguided, just as decades of classic DNS vulnerabilities did not prove that DNS itself should be abandoned. What it proves is more mundane and more important: new protocol surfaces need mature operational treatment before they become invisible infrastructure.
For enterprises, that means DoH policy should be explicit. If clients are allowed to use external DoH resolvers, the organization needs to understand the monitoring, filtering, incident response, and data-governance consequences. If the organization runs its own DoH resolvers, it needs to patch and monitor them like web-facing infrastructure, not like a sleepy internal name service.
The worst posture is accidental DoH: enabled because a product default changed, exposed because a reverse proxy made it easy, and untracked because the DNS team and web platform team each assumed the other owned the risk. CVE-2026-3593 should push organizations away from accidental architecture and toward deliberate ownership.

The Practical Fix Is Boring, Which Is Exactly the Point​

The remediation is not glamorous. Upgrade to the fixed branch closest to the one already deployed. Test the service. Confirm DoH behavior. Watch for regressions. If patching cannot happen immediately, disable DoH until it can. That is the correct path precisely because DNS infrastructure rewards boring decisions.
The challenge is not knowing what to do; it is doing it across all the places BIND may be hiding. Public authoritative servers are often easier to identify than internal recursive services. Internal recursive services are often easier to patch than vendor appliances. Containers may be easy to rebuild but hard to discover. Managed DNS providers may be easy to ask but slow to answer with enough specificity.
Administrators should also verify whether monitoring distinguishes classic DNS from DoH. A server may respond perfectly on UDP 53 while the DoH endpoint is failing, or the reverse may be true. Synthetic checks should exercise the protocol clients actually use. Logs should be reviewed for unusual HTTP/2 behavior, repeated connection resets, process crashes, restarts, or memory-related failures around the disclosure window.
There is no public report of active exploitation from ISC’s advisory, but that should not become an excuse to wait for exploit telemetry. Attackers do not need to invent interest in DNS. It is already one of the most leveraged services on the internet, and availability attacks against DNS remain attractive because they create visible disruption without requiring compromise of every downstream application.

The Real Inventory Item Is “BIND With DoH Enabled”​

The concrete response to CVE-2026-3593 is short enough to fit on a change ticket, but the underlying lesson belongs in the architecture review. Treat DoH as a distinct exposure, verify the affected branches, and do not let Microsoft’s appearance in the advisory chain confuse the product boundary.
  • BIND 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, and supported preview builds 9.20.9-S1 through 9.20.22-S1 are the affected release ranges.
  • BIND 9.18.0 through 9.18.48 and supported preview builds 9.18.11-S1 through 9.18.48-S1 are listed by ISC as not affected.
  • The fixed upstream releases are BIND 9.20.23, BIND 9.21.22, and BIND 9.20.23-S1.
  • Systems not using DNS-over-HTTPS should not be affected, and disabling DoH is the documented workaround when immediate patching is not possible.
  • Both authoritative and recursive BIND deployments can be affected if they expose the vulnerable DoH implementation.
  • The MSRC entry should prompt Windows administrators to check BIND dependencies and DNS vendors, not to assume Windows DNS Server itself is the vulnerable component.
CVE-2026-3593 will probably not be remembered as the vulnerability that changed DNS, and that is fine. Its value is as a timely stress test for how honestly organizations understand their name-resolution infrastructure in 2026: not just which daemon answers port 53, but which encrypted transports are exposed, which teams own them, which vendors patch them, and how quickly a privacy feature can be treated as production attack surface when the next advisory lands.

References​

  1. Primary source: MSRC
    Published: 2026-05-23T01:01:32-07:00
  2. Official source: microsoft.com
  3. Related coverage: cyber.gc.ca
  4. Related coverage: cyber.gov.au
 

Back
Top