CVE-2025-40779: CWE-476 NULL Pointer Dereference in ISC Kea
If a DHCPv4 client sends a request with some specific options, and Kea fails to find an appropriate subnet for the client, the `kea-dhcp4` process will abort with an assertion failure. This happens only if the client request is unicast directly to Kea; broadcast messages do not cause the problem. This issue affects Kea versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0.
AI Analysis
Technical Summary
CVE-2025-40779 is a high-severity vulnerability affecting ISC Kea DHCP server versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0. The issue arises from a NULL pointer dereference (CWE-476) in the kea-dhcp4 process. Specifically, when a DHCPv4 client sends a unicast request containing certain specific options, and Kea fails to locate an appropriate subnet for the client, the kea-dhcp4 process encounters an assertion failure and aborts. This results in a denial of service (DoS) condition, as the DHCP server process crashes and becomes unavailable to service DHCP requests. Notably, this problem does not occur with broadcast DHCP messages, only with unicast requests directly sent to the Kea server. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, no privileges or user interaction required, and a direct impact on availability. There are no known exploits in the wild at the time of publication, and no patches are linked yet. The root cause is a failure to properly handle cases where no matching subnet is found for a client request, leading to dereferencing a NULL pointer and triggering an assertion failure that crashes the process. This vulnerability could be exploited by an unauthenticated attacker capable of sending crafted unicast DHCPv4 requests to the Kea server, causing service disruption by crashing the DHCP server process.
Potential Impact
For European organizations relying on ISC Kea DHCP servers, this vulnerability poses a significant risk of denial of service. DHCP is a critical network service responsible for dynamically assigning IP addresses and network configuration to clients. A crash of the kea-dhcp4 process can disrupt network connectivity for clients, potentially causing widespread outages in enterprise, government, or service provider networks. This can impact business operations, especially in environments with high DHCP dependency such as large corporate LANs, data centers, and managed service providers. The ease of exploitation—no authentication or user interaction required—and the network attack vector mean attackers can remotely trigger the crash simply by sending crafted DHCPv4 unicast requests. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks or automated scanning campaigns. The impact on confidentiality and integrity is minimal, but the availability impact is high, potentially leading to network downtime and operational disruption. Organizations with critical infrastructure or services relying on Kea DHCP servers should prioritize mitigation to maintain network stability.
Mitigation Recommendations
Organizations should immediately audit their DHCP infrastructure to identify any ISC Kea DHCP servers running affected versions (2.7.1 through 2.7.9, 3.0.0, and 3.1.0). Until patches are available, network-level mitigations should be implemented: restrict access to DHCP servers to trusted network segments and block untrusted sources from sending unicast DHCPv4 requests to the server. Deploy network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block malformed DHCPv4 requests that could trigger the crash. Monitor DHCP server logs and system stability closely for signs of crashes or unusual requests. Consider deploying redundant DHCP servers or failover mechanisms to maintain service availability in case of crashes. Once ISC releases patches addressing this vulnerability, apply them promptly. Additionally, engage with ISC support or community channels to obtain any available workarounds or interim fixes. Finally, review DHCP server configuration to ensure proper subnet definitions and validation to reduce the likelihood of unhandled client requests.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-40779: CWE-476 NULL Pointer Dereference in ISC Kea
Description
If a DHCPv4 client sends a request with some specific options, and Kea fails to find an appropriate subnet for the client, the `kea-dhcp4` process will abort with an assertion failure. This happens only if the client request is unicast directly to Kea; broadcast messages do not cause the problem. This issue affects Kea versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-40779 is a high-severity vulnerability affecting ISC Kea DHCP server versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0. The issue arises from a NULL pointer dereference (CWE-476) in the kea-dhcp4 process. Specifically, when a DHCPv4 client sends a unicast request containing certain specific options, and Kea fails to locate an appropriate subnet for the client, the kea-dhcp4 process encounters an assertion failure and aborts. This results in a denial of service (DoS) condition, as the DHCP server process crashes and becomes unavailable to service DHCP requests. Notably, this problem does not occur with broadcast DHCP messages, only with unicast requests directly sent to the Kea server. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, no privileges or user interaction required, and a direct impact on availability. There are no known exploits in the wild at the time of publication, and no patches are linked yet. The root cause is a failure to properly handle cases where no matching subnet is found for a client request, leading to dereferencing a NULL pointer and triggering an assertion failure that crashes the process. This vulnerability could be exploited by an unauthenticated attacker capable of sending crafted unicast DHCPv4 requests to the Kea server, causing service disruption by crashing the DHCP server process.
Potential Impact
For European organizations relying on ISC Kea DHCP servers, this vulnerability poses a significant risk of denial of service. DHCP is a critical network service responsible for dynamically assigning IP addresses and network configuration to clients. A crash of the kea-dhcp4 process can disrupt network connectivity for clients, potentially causing widespread outages in enterprise, government, or service provider networks. This can impact business operations, especially in environments with high DHCP dependency such as large corporate LANs, data centers, and managed service providers. The ease of exploitation—no authentication or user interaction required—and the network attack vector mean attackers can remotely trigger the crash simply by sending crafted DHCPv4 unicast requests. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks or automated scanning campaigns. The impact on confidentiality and integrity is minimal, but the availability impact is high, potentially leading to network downtime and operational disruption. Organizations with critical infrastructure or services relying on Kea DHCP servers should prioritize mitigation to maintain network stability.
Mitigation Recommendations
Organizations should immediately audit their DHCP infrastructure to identify any ISC Kea DHCP servers running affected versions (2.7.1 through 2.7.9, 3.0.0, and 3.1.0). Until patches are available, network-level mitigations should be implemented: restrict access to DHCP servers to trusted network segments and block untrusted sources from sending unicast DHCPv4 requests to the server. Deploy network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block malformed DHCPv4 requests that could trigger the crash. Monitor DHCP server logs and system stability closely for signs of crashes or unusual requests. Consider deploying redundant DHCP servers or failover mechanisms to maintain service availability in case of crashes. Once ISC releases patches addressing this vulnerability, apply them promptly. Additionally, engage with ISC support or community channels to obtain any available workarounds or interim fixes. Finally, review DHCP server configuration to ensure proper subnet definitions and validation to reduce the likelihood of unhandled client requests.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- isc
- Date Reserved
- 2025-04-16T08:44:49.857Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68af6b74ad5a09ad0065fbaf
Added to database: 8/27/2025, 8:32:52 PM
Last enriched: 9/4/2025, 1:28:28 AM
Last updated: 10/17/2025, 1:15:44 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-28814: Vulnerability in Hikvision iSecure Center
Critical‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability
HighCVE-2025-11895: CWE-639 Authorization Bypass Through User-Controlled Key in letscms Binary MLM Plan
MediumCVE-2025-55087: CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input in Eclipse Foundation NextX Duo
MediumCVE-2025-55100: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.