Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11232: CWE-823 Use of Out-of-range Pointer Offset in ISC Kea

0
High
VulnerabilityCVE-2025-11232cvecve-2025-11232cwe-823
Published: Wed Oct 29 2025 (10/29/2025, 18:02:39 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: Kea

Description

To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.

AI-Powered Analysis

AILast updated: 10/29/2025, 18:27:24 UTC

Technical Analysis

CVE-2025-11232 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting ISC Kea DHCP server versions 3.0.1 and 3.1.1 through 3.1.2. The flaw is triggered when three configuration parameters are set in a specific way: the "hostname-char-set" remains at its default regex value "[^A-Za-z0-9.-]", "hostname-char-replacement" is empty (default), and "ddns-qualifying-suffix" is set to a non-empty string (deviating from its default empty value). Under these conditions, a remote DHCP client can send specially crafted DHCP option content that causes the kea-dhcp4 process to dereference an out-of-range pointer, leading to an unexpected crash of the DHCP server process. This results in a denial of service (DoS) condition, disrupting DHCP services. The vulnerability does not require DDNS updates to be enabled, nor does it require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, lack of required privileges, and the impact limited to availability. No known public exploits are reported yet, but the vulnerability poses a significant risk to network availability where ISC Kea DHCP servers are deployed with the vulnerable configurations. ISC Kea is widely used in ISP and enterprise environments for DHCP services, making this vulnerability relevant to critical infrastructure. The absence of patches at the time of reporting necessitates configuration workarounds or monitoring until fixes are released.

Potential Impact

The primary impact of CVE-2025-11232 is denial of service due to the kea-dhcp4 process crashing upon receipt of malicious DHCP option content. For European organizations, especially ISPs, data centers, and enterprises relying on ISC Kea for DHCP services, this can lead to network outages, loss of IP address assignment capabilities, and disruption of connected services dependent on DHCP. This can affect business continuity, cause operational downtime, and potentially impact critical services such as VoIP, internal communications, and cloud infrastructure. The vulnerability’s remote exploitability without authentication increases the risk of opportunistic attacks or targeted disruption campaigns. Given the importance of DHCP in network operations, prolonged or repeated exploitation could degrade trust in network reliability and increase operational costs. Additionally, organizations in sectors with stringent uptime requirements (e.g., finance, healthcare, government) may face regulatory and compliance challenges if service interruptions occur. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact on availability make this a pressing concern.

Mitigation Recommendations

Until official patches are released by ISC, European organizations should implement the following mitigations: 1) Review and modify the DHCP server configuration to avoid the vulnerable parameter combination by either changing "hostname-char-set" from the default regex or ensuring "ddns-qualifying-suffix" remains empty if feasible; 2) Monitor DHCP server logs and network traffic for anomalous DHCP option content that could indicate exploitation attempts; 3) Employ network-level protections such as DHCP snooping and filtering to restrict DHCP traffic to trusted clients and prevent malicious packets from reaching the server; 4) Implement redundancy and failover mechanisms for DHCP services to minimize impact in case of service crashes; 5) Stay updated with ISC advisories and apply patches promptly once available; 6) Conduct internal vulnerability assessments and penetration testing to verify the absence of the vulnerable configuration and confirm mitigation effectiveness; 7) Educate network administrators about the specific configuration risks and signs of exploitation to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
isc
Date Reserved
2025-10-01T15:15:46.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6902598f52c03fa7b6eb66e0

Added to database: 10/29/2025, 6:14:39 PM

Last enriched: 10/29/2025, 6:27:24 PM

Last updated: 10/30/2025, 1:38:04 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats