Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-250 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 28 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | |
Title | Insecure handling of file paths allows multiple local attacks | |
Weaknesses | CWE-379 CWE-73 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published: 2025-05-28T17:08:11.180Z
Updated: 2025-05-28T17:23:22.213Z
Reserved: 2025-04-10T12:51:45.055Z
Link: CVE-2025-32802

Updated: 2025-05-28T17:23:12.869Z

Status : Awaiting Analysis
Published: 2025-05-28T17:15:23.890
Modified: 2025-05-29T14:29:50.247
Link: CVE-2025-32802
