This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade to the patched release most closely related to your current version of Kea: 2.6.5 or 3.0.3.
Workaround
Securing the API sockets with TLS, and requiring the client to authenticate with a certificate (mutual authentication), prevents the attacker from establishing an API connection to Kea. Set cert-required to true (the default) to require a client certificate. See: https://kea.readthedocs.io/en/stable/arm/security.html#tls-https-configuration
Wed, 25 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2. | |
| Title | Stack overflow in Kea daemons | |
| First Time appeared |
Isc
Isc kea |
|
| Weaknesses | CWE-617 | |
| CPEs | cpe:2.3:a:isc:kea:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Isc
Isc kea |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2026-03-25T17:22:19.777Z
Reserved: 2026-03-05T17:47:36.088Z
Link: CVE-2026-3608
Updated: 2026-03-25T17:22:19.777Z
Status : Awaiting Analysis
Published: 2026-03-25T09:16:25.810
Modified: 2026-03-25T18:16:32.853
Link: CVE-2026-3608
OpenCVE Enrichment
Updated: 2026-03-25T21:15:53Z