This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Metrics
Affected Vendors & Products
Solution
Upgrade to the patched release most closely related to your current version of Kea: 2.4.2, 2.6.3, or 2.7.9.
Workaround
Two mitigation approaches are possible: (1) Disable the API entirely, by (1a) disabling the `kea-ctrl-agent`, and (1b) removing any `"control-socket"` stanzas from the Kea configuration files; or (2) Secure access to the API by (2a) requiring authentication (a password or client certificate) for the `kea-ctrl-agent`, and (2b) configuring all `"control-socket"` stanzas to use a directory restricted to only trusted users.
Tue, 17 Jun 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 30 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-250 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 28 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | |
Title | Insecure handling of file paths allows multiple local attacks | |
Weaknesses | CWE-379 CWE-73 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T17:23:22.213Z
Reserved: 2025-04-10T12:51:45.055Z
Link: CVE-2025-32802

Updated: 2025-05-28T17:23:12.869Z

Status : Awaiting Analysis
Published: 2025-05-28T17:15:23.890
Modified: 2025-05-29T14:29:50.247
Link: CVE-2025-32802


No data.