Skip to main content

CVE-2025-32801: CWE-94 Improper Control of Generation of Code ('Code Injection') in ISC Kea

High
VulnerabilityCVE-2025-32801cvecve-2025-32801cwe-94
Published: Wed May 28 2025 (05/28/2025, 17:03:34 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: Kea

Description

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

AI-Powered Analysis

AILast updated: 07/07/2025, 07:26:00 UTC

Technical Analysis

CVE-2025-32801 is a high-severity vulnerability affecting ISC Kea DHCP server versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. The vulnerability is classified under CWE-94, which involves improper control of code generation, commonly known as code injection. Kea's configuration and API directives allow loading of hook libraries, which are dynamically loaded modules that extend Kea's functionality. The vulnerability arises because many default or common configurations run Kea with root privileges, leave API entry points unsecured, and place control sockets in insecure filesystem locations. This combination enables an attacker with limited privileges (local access) to load a malicious hook library, effectively injecting arbitrary code into the Kea process. The CVSS v3.1 score is 7.8 (high), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating that exploitation requires local access with low privileges, no user interaction, and results in high confidentiality, integrity, and availability impacts. Exploitation could lead to full system compromise, data exfiltration, or denial of service. Although no known exploits are currently in the wild, the vulnerability's nature and severity make it a critical concern for organizations using affected Kea versions, especially those running the service as root or with insecure API and socket configurations. The lack of patch links suggests that fixes may be pending or not yet publicly available, increasing the urgency for mitigation through configuration hardening and access controls.

Potential Impact

For European organizations, the impact of CVE-2025-32801 is significant, especially for ISPs, data centers, and enterprises relying on ISC Kea for DHCP services. Successful exploitation can lead to unauthorized code execution with root privileges, enabling attackers to compromise network infrastructure, intercept or manipulate DHCP traffic, and potentially pivot to other critical systems. This threatens confidentiality by exposing network configuration data, integrity by allowing malicious manipulation of DHCP assignments, and availability by disrupting DHCP services, which are essential for network operations. Given that many organizations run Kea as root and may not have secured API endpoints or control sockets, the risk of lateral movement and persistent compromise increases. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or government networks in Europe, where DHCP services are foundational. The absence of known exploits currently provides a window for proactive defense, but the high severity and ease of local exploitation necessitate immediate attention to prevent potential breaches.

Mitigation Recommendations

To mitigate CVE-2025-32801, European organizations should: 1) Immediately audit all Kea DHCP deployments to identify affected versions (2.4.0-2.4.1, 2.6.0-2.6.2, 2.7.0-2.7.8). 2) Restrict Kea execution privileges by running the service under a dedicated, non-root user with minimal permissions to limit the impact of any code injection. 3) Secure API entry points by implementing strong authentication and access controls, ensuring that only authorized administrators can interact with the API. 4) Relocate control sockets to secure filesystem paths with strict permissions to prevent unauthorized local access. 5) Monitor system logs and network activity for unusual behavior indicative of hook library loading or unauthorized API usage. 6) Engage with ISC for patches or updates addressing this vulnerability and plan prompt deployment once available. 7) Consider network segmentation to isolate DHCP servers from untrusted users or systems, reducing the likelihood of local exploitation. 8) Implement host-based intrusion detection systems (HIDS) to detect anomalous code injection attempts or unauthorized library loads. These steps go beyond generic advice by focusing on configuration hardening, privilege reduction, and access control specific to Kea's architecture and the vulnerability's exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-04-10T12:51:45.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6837447f182aa0cae2557b29

Added to database: 5/28/2025, 5:14:39 PM

Last enriched: 7/7/2025, 7:26:00 AM

Last updated: 8/13/2025, 7:27:52 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats