CVE-2025-32802

Name
CVE-2025-32802
Description
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://kb.isc.org/docs/cve-2025-32802

Match rules

CPE URI Source package Min version Max version
kea >= 2.4.0 <= 2.4.1
kea >= 2.6.0 <= 2.6.2
kea >= 2.7.0 <= 2.7.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
kea edge-main 2.6.1-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.2-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.2-r1 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
kea edge-main 2.6.3-r0 Jakub Jirutka <jakub@jirutka.cz> fixed