CVE-2025-32802: CWE-73 External Control of File Name or Path in ISC Kea
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
AI Analysis
Technical Summary
CVE-2025-32802 is a vulnerability identified in ISC Kea, a widely used open-source DHCP server software. The flaw is categorized under CWE-73, which involves external control of file names or paths. Specifically, the vulnerability allows an attacker to leverage Kea's configuration and API directives to overwrite arbitrary files on the host system. This capability is contingent upon the permissions granted to the Kea process. Notably, many default or common Kea deployments run the service with root privileges, expose API entry points without adequate security controls, and place control sockets in insecure filesystem locations. These factors collectively increase the risk and potential impact of exploitation. The affected versions include Kea 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. The CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) reflects that exploitation requires local access with low privileges, no user interaction, and results in no confidentiality impact but causes integrity loss and high availability impact. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability arises from insufficient access control and insecure default configurations, which allow external inputs to influence file paths used by Kea, enabling unauthorized file overwrites that can disrupt DHCP services or potentially facilitate privilege escalation or further system compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on ISC Kea for DHCP services in critical network infrastructure. Successful exploitation can lead to denial of service by corrupting DHCP configurations or service files, causing network outages or degraded service availability. Given that many deployments run Kea as root, attackers could overwrite sensitive system files, potentially enabling privilege escalation or persistent backdoors. This could disrupt enterprise networks, data centers, or ISPs, impacting business continuity and service reliability. Additionally, compromised DHCP services can lead to broader network security issues, such as unauthorized IP address allocation or man-in-the-middle attacks. The medium severity rating reflects the need for local access and low privileges, which somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds. The lack of user interaction requirement increases the risk of automated or scripted exploitation once local access is obtained.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first audit their Kea deployments to identify affected versions (2.4.0-2.4.1, 2.6.0-2.6.2, 2.7.0-2.7.8). Immediate steps include: 1) Restricting Kea process privileges by running it under a dedicated, non-root user with minimal permissions strictly necessary for operation. 2) Securing API entry points by implementing strong authentication and network access controls to prevent unauthorized local or remote access. 3) Relocating control sockets to secure filesystem paths with restricted permissions to prevent unauthorized manipulation. 4) Monitoring and logging API usage and file system changes related to Kea to detect suspicious activity. 5) Applying any forthcoming patches or updates from ISC promptly once available. 6) Conducting regular configuration reviews to ensure no insecure defaults remain. 7) Employing host-based intrusion detection systems to alert on unexpected file modifications. These targeted measures go beyond generic advice by focusing on the specific vectors exploited by this vulnerability and the typical insecure configurations that exacerbate risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-32802: CWE-73 External Control of File Name or Path in ISC Kea
Description
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-32802 is a vulnerability identified in ISC Kea, a widely used open-source DHCP server software. The flaw is categorized under CWE-73, which involves external control of file names or paths. Specifically, the vulnerability allows an attacker to leverage Kea's configuration and API directives to overwrite arbitrary files on the host system. This capability is contingent upon the permissions granted to the Kea process. Notably, many default or common Kea deployments run the service with root privileges, expose API entry points without adequate security controls, and place control sockets in insecure filesystem locations. These factors collectively increase the risk and potential impact of exploitation. The affected versions include Kea 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. The CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) reflects that exploitation requires local access with low privileges, no user interaction, and results in no confidentiality impact but causes integrity loss and high availability impact. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability arises from insufficient access control and insecure default configurations, which allow external inputs to influence file paths used by Kea, enabling unauthorized file overwrites that can disrupt DHCP services or potentially facilitate privilege escalation or further system compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on ISC Kea for DHCP services in critical network infrastructure. Successful exploitation can lead to denial of service by corrupting DHCP configurations or service files, causing network outages or degraded service availability. Given that many deployments run Kea as root, attackers could overwrite sensitive system files, potentially enabling privilege escalation or persistent backdoors. This could disrupt enterprise networks, data centers, or ISPs, impacting business continuity and service reliability. Additionally, compromised DHCP services can lead to broader network security issues, such as unauthorized IP address allocation or man-in-the-middle attacks. The medium severity rating reflects the need for local access and low privileges, which somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds. The lack of user interaction requirement increases the risk of automated or scripted exploitation once local access is obtained.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first audit their Kea deployments to identify affected versions (2.4.0-2.4.1, 2.6.0-2.6.2, 2.7.0-2.7.8). Immediate steps include: 1) Restricting Kea process privileges by running it under a dedicated, non-root user with minimal permissions strictly necessary for operation. 2) Securing API entry points by implementing strong authentication and network access controls to prevent unauthorized local or remote access. 3) Relocating control sockets to secure filesystem paths with restricted permissions to prevent unauthorized manipulation. 4) Monitoring and logging API usage and file system changes related to Kea to detect suspicious activity. 5) Applying any forthcoming patches or updates from ISC promptly once available. 6) Conducting regular configuration reviews to ensure no insecure defaults remain. 7) Employing host-based intrusion detection systems to alert on unexpected file modifications. These targeted measures go beyond generic advice by focusing on the specific vectors exploited by this vulnerability and the typical insecure configurations that exacerbate risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- isc
- Date Reserved
- 2025-04-10T12:51:45.055Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6837447f182aa0cae2557b2b
Added to database: 5/28/2025, 5:14:39 PM
Last enriched: 7/7/2025, 7:40:07 AM
Last updated: 8/9/2025, 2:57:03 PM
Views: 13
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.