CVE-2025-32801

Name
CVE-2025-32801
Description
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://kb.isc.org/docs/cve-2025-32801

Match rules

CPE URI Source package Min version Max version
kea >= 2.4.0 <= 2.4.1
kea >= 2.6.0 <= 2.6.2
kea >= 2.7.0 <= 2.7.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
kea edge-main 2.6.1-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.2-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.2-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.3-r0 Jakub Jirutka <jakub@jirutka.cz> fixed