Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40779: CWE-476 NULL Pointer Dereference in ISC Kea

0
High
VulnerabilityCVE-2025-40779cvecve-2025-40779cwe-476
Published: Wed Aug 27 2025 (08/27/2025, 20:23:29 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: Kea

Description

If a DHCPv4 client sends a request with some specific options, and Kea fails to find an appropriate subnet for the client, the `kea-dhcp4` process will abort with an assertion failure. This happens only if the client request is unicast directly to Kea; broadcast messages do not cause the problem. This issue affects Kea versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:47:42 UTC

Technical Analysis

CVE-2025-40779 is a vulnerability classified as CWE-476 (NULL Pointer Dereference) affecting ISC Kea DHCP server versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0. The flaw occurs when a DHCPv4 client sends a unicast request containing specific DHCP options, and the Kea server fails to locate an appropriate subnet for the client. Under these conditions, the kea-dhcp4 process encounters an assertion failure due to dereferencing a NULL pointer, causing the process to abort unexpectedly. This results in a denial of service (DoS) as the DHCP server process crashes and stops responding to DHCP requests. The vulnerability is triggered only by unicast DHCP requests; broadcast requests do not cause this failure. The CVSS v3.1 score is 7.5, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). No patches or exploits are currently publicly available, but the vulnerability poses a risk to network stability and availability. The issue is particularly critical for environments where DHCP services are essential for IP address management and network connectivity. Attackers can remotely cause service disruption without authentication, making this a significant threat to network infrastructure.

Potential Impact

The primary impact of CVE-2025-40779 is a denial of service condition on DHCP services provided by ISC Kea. For European organizations, this can lead to network outages or degraded network performance as DHCP clients fail to obtain or renew IP addresses. Critical infrastructure, enterprises, and service providers relying on Kea for dynamic IP allocation may experience operational disruptions, affecting business continuity and user productivity. The inability to assign IP addresses can cascade into broader network failures, impacting internal communications, access to cloud services, and internet connectivity. Since the vulnerability can be triggered remotely without authentication, it increases the risk of targeted or opportunistic attacks against network infrastructure. The lack of confidentiality or integrity impact reduces the risk of data breaches, but the availability impact alone can have severe consequences, especially in sectors like finance, healthcare, telecommunications, and government services where network uptime is crucial.

Mitigation Recommendations

1. Upgrade ISC Kea DHCP server to a patched version once the vendor releases a fix addressing CVE-2025-40779. Monitor ISC advisories and security bulletins for updates. 2. Implement network-level filtering to restrict unicast DHCP requests to trusted clients only, using firewall rules or DHCP relay configurations to limit exposure. 3. Monitor DHCP server logs and system stability to detect abnormal crashes or assertion failures indicative of exploitation attempts. 4. Deploy redundancy and failover mechanisms for DHCP services to maintain availability in case of process crashes. 5. Conduct regular security assessments and penetration testing focusing on DHCP infrastructure to identify potential weaknesses. 6. Educate network administrators about this vulnerability and ensure incident response plans include DHCP service disruptions. 7. Consider isolating DHCP servers in dedicated network segments to reduce attack surface and limit impact scope.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-04-16T08:44:49.857Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68af6b74ad5a09ad0065fbaf

Added to database: 8/27/2025, 8:32:52 PM

Last enriched: 11/4/2025, 9:47:42 PM

Last updated: 11/30/2025, 5:17:29 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats