Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 30 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-267 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 28 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | |
Title | Loading a malicious hook library can lead to local privilege escalation | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T17:33:50.355Z
Reserved: 2025-04-10T12:51:45.055Z
Link: CVE-2025-32801

Updated: 2025-05-28T17:33:41.278Z

Status : Awaiting Analysis
Published: 2025-05-28T17:15:23.710
Modified: 2025-05-29T14:29:50.247
Link: CVE-2025-32801


No data.