Vulnerability in Kea DHCP Server Leads to Potential Malicious Hook Library Execution
CVE-2025-32801
7.8HIGH
What is CVE-2025-32801?
The Kea DHCP Server has a vulnerability that allows configuration and API directives to load a malicious hook library. Many common configurations run Kea as the root user, leaving the API entry points unsecured by default and placing control sockets in insecure paths. This opens up potential for unauthorized access and exploitability, impacting systems running vulnerable versions of Kea DHCP Server.
Affected Version(s)
Kea 2.4.0 <= 2.4.1
Kea 2.6.0 <= 2.6.2
Kea 2.7.0 <= 2.7.8
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
ISC would like to thank Matthias Gerstner from the SUSE security team and Laura Pardo from Red Hat's Product Security Team for bringing this vulnerability to our attention.