Impact
A crafted message sent to any of the Kea daemons that listen on an API socket or HA listener can cause a stack overflow, terminating the daemon. The result is a denial‑of‑service condition; the affected service stops until restarted and no code execution is possible.
Affected Systems
The vulnerability affects the ISC Kea DHCP suite, including kea‑ctrl‑agent, kea‑dhcp‑ddns, kea‑dhcp4, and kea‑dhcp6. Versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2 on any platform that exposes an API socket or HA listener are susceptible.
Risk and Exploitability
The severity score is 7.5, placing the issue in the high range. No EPSS score is available, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker with network access to the exposed API endpoint can trigger the overflow without privileged access. Prompt remediation is advised, especially if the sockets are reachable from untrusted networks.
OpenCVE Enrichment