To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly.
This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to the patched release most closely related to your current version of Kea: 3.0.2 or 3.1.3.


Workaround

Setting "hostname-char-replacement" to anything other than an empty value (suggestion: "x") is an effective workaround to this issue, regardless of other settings.

History

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Isc
Isc kea
Vendors & Products Isc
Isc kea

Thu, 30 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 29 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Description To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
Title Invalid characters cause assert
Weaknesses CWE-823
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-11-04T21:09:09.184Z

Reserved: 2025-10-01T15:15:46.992Z

Link: CVE-2025-11232

cve-icon Vulnrichment

Updated: 2025-11-04T21:09:09.184Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T18:15:40.197

Modified: 2025-11-04T22:16:05.600

Link: CVE-2025-11232

cve-icon Redhat

Severity : Important

Publid Date: 2025-10-29T18:02:39Z

Links: CVE-2025-11232 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:37:49Z