Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 30 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-250 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 28 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | |
Title | Insecure handling of file paths allows multiple local attacks | |
Weaknesses | CWE-379 CWE-73 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T17:23:22.213Z
Reserved: 2025-04-10T12:51:45.055Z
Link: CVE-2025-32802

Updated: 2025-05-28T17:23:12.869Z

Status : Awaiting Analysis
Published: 2025-05-28T17:15:23.890
Modified: 2025-05-29T14:29:50.247
Link: CVE-2025-32802
