CVE Alert: CVE-2025-11232 – ISC – Kea

CVE-2025-11232

HIGHNo exploitation known

To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
ISC
Product
Kea
Versions
3.0.1 lte 3.0.1 | 3.1.1 lte 3.1.2 | 2.6.0 lte 2.6.4 | 2.7.0 lte 2.7.9 | 3.0.0 lte 3.0.0 | 3.1.0 lte 3.1.0
CWE
CWE-823, CWE-823 Use of Out-of-range Pointer Offset
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-29T18:02:39.421Z
Updated
2025-10-29T18:22:23.455Z

AI Summary Analysis

Risk verdict

High severity DoS risk to Kea DHCP on network exposure, but currently no known exploits and exploitability requires specific default configuration settings.

Why this matters

If exploited, the issue can crash the DHCP service, causing client network connectivity failures and potential enterprise-wide outages on DHCP-dependent devices. The impact is direct on service availability, with potential knock-on effects to VPNs, VoIP, and bootstrapping of devices.

Most likely attack path

External attacker can trigger a remote DoS via network traffic to kea-dhcp4, without authentication, because the CVSS implies network access with low complexity and no user interaction. Exploitability hinges on three configuration preconditions being in their defaults; no DDNS updates are required, increasing precondition rigidity but not eliminating risk. In practice, automated scans could probe for default settings and attempts could cause the daemon to exit, leading to service disruption.

Who is most exposed

Deployments of Kea DHCP in data centres, campuses, or cloud environments where the DHCP service is reachable on shared networks are most at risk. Environments with default or legacy configurations (3.0.x/3.1.x in scope) are particularly relevant.

Detection ideas

  • Frequent kea-dhcp4 process crashes or core dumps
  • Unusual spikes in DHCP requests with anomalous option content
  • Recurrent DHCP daemon restarts and elevated CPU during incidents
  • Syslog/monitoring alerts showing abrupt service outages
  • Correlation of outages with specific network segments

Mitigation and prioritisation

  • Upgrade to patched releases: 3.0.2 or 3.1.3 across all instances
  • Apply the workaround: set hostname-char-replacement to a non-empty value (e.g., "x")
  • Review and tighten network exposure of DHCP servers; limit reachable segments
  • Validate configuration defaults; consider disabling DDNS features if unused
  • Schedule patch testing and deployment in line with change-management processes

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features