Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-16210 Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Fixes

Solution

Upgrade to the patched release most closely related to your current version of Kea: 2.4.2, 2.6.3, or 2.7.9.


Workaround

Two mitigation approaches are possible: (1) Disable the Kea API entirely, by (1a) disabling the `kea-ctrl-agent`, and (1b) removing any `"control-socket"` stanzas from the Kea configuration files; or (2) Secure access to the API by (2a) requiring authentication (a password or client certificate) for the `kea-ctrl-agent`, and (2b) configuring all `"control-socket"` stanzas to use a directory restricted to only trusted users.

History

Tue, 17 Jun 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10.0
Vendors & Products Redhat
Redhat enterprise Linux

Fri, 30 May 2025 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-267
References
Metrics threat_severity

None

threat_severity

Important


Wed, 28 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 May 2025 17:15:00 +0000

Type Values Removed Values Added
Description Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Title Loading a malicious hook library can lead to local privilege escalation
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-05-28T17:33:50.355Z

Reserved: 2025-04-10T12:51:45.055Z

Link: CVE-2025-32801

cve-icon Vulnrichment

Updated: 2025-05-28T17:33:41.278Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-28T17:15:23.710

Modified: 2025-05-29T14:29:50.247

Link: CVE-2025-32801

cve-icon Redhat

Severity : Important

Publid Date: 2025-05-28T00:00:00Z

Links: CVE-2025-32801 - Bugzilla

cve-icon OpenCVE Enrichment

No data.