Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ue3u-3a17-8uej
Vulnerability ID VCID-ue3u-3a17-8uej
Aliases CVE-2024-1975
Summary bind9: bind: SIG(0) can be used to exhaust CPU resources
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json
https://api.first.org/data/v1/epss?cve=CVE-2024-1975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1 http://www.openwall.com/lists/oss-security/2024/07/23/1
2 http://www.openwall.com/lists/oss-security/2024/07/31/2
2298901 https://bugzilla.redhat.com/show_bug.cgi?id=2298901
cve-2024-1975 https://kb.isc.org/docs/cve-2024-1975
RHSA-2024:5231 https://access.redhat.com/errata/RHSA-2024:5231
RHSA-2024:5390 https://access.redhat.com/errata/RHSA-2024:5390
RHSA-2024:5418 https://access.redhat.com/errata/RHSA-2024:5418
RHSA-2024:5524 https://access.redhat.com/errata/RHSA-2024:5524
RHSA-2024:5525 https://access.redhat.com/errata/RHSA-2024:5525
RHSA-2024:5655 https://access.redhat.com/errata/RHSA-2024:5655
RHSA-2024:5813 https://access.redhat.com/errata/RHSA-2024:5813
RHSA-2024:5838 https://access.redhat.com/errata/RHSA-2024:5838
RHSA-2024:5871 https://access.redhat.com/errata/RHSA-2024:5871
RHSA-2024:5894 https://access.redhat.com/errata/RHSA-2024:5894
RHSA-2024:5907 https://access.redhat.com/errata/RHSA-2024:5907
RHSA-2024:5908 https://access.redhat.com/errata/RHSA-2024:5908
RHSA-2024:5930 https://access.redhat.com/errata/RHSA-2024:5930
RHSA-2024:6004 https://access.redhat.com/errata/RHSA-2024:6004
RHSA-2024:6013 https://access.redhat.com/errata/RHSA-2024:6013
RHSA-2024:6642 https://access.redhat.com/errata/RHSA-2024:6642
USN-6909-1 https://usn.ubuntu.com/6909-1/
USN-6909-2 https://usn.ubuntu.com/6909-2/
USN-6909-3 https://usn.ubuntu.com/6909-3/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://kb.isc.org/docs/cve-2024-1975
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/ Found at https://kb.isc.org/docs/cve-2024-1975
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.openwall.com/lists/oss-security/2024/07/23/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/ Found at http://www.openwall.com/lists/oss-security/2024/07/23/1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.openwall.com/lists/oss-security/2024/07/31/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/ Found at http://www.openwall.com/lists/oss-security/2024/07/31/2
Exploit Prediction Scoring System (EPSS)
Percentile 0.34641
EPSS Score 0.00143
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:46:07.550748+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json 38.0.0