Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
References
Link | Resource |
---|---|
https://kb.isc.org/docs/cve-2025-32801 |
Configurations
No configuration.
History
28 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-28 17:15
Updated : 2025-05-29 14:29
NVD link : CVE-2025-32801
Mitre link : CVE-2025-32801
CVE.ORG link : CVE-2025-32801
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')