CVE-2025-11232

HIGH

Kea <3.0.1 - DoS

Title source: llm
STIX 2.1

Description

To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.

Scores

CVSS v3 7.5
EPSS 0.0003
EPSS Percentile 7.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-823
Status published
Products (6)
ISC/Kea 2.6.0 - 2.6.4
ISC/Kea 2.7.0 - 2.7.9
ISC/Kea 3.0.0
ISC/Kea 3.0.1
ISC/Kea 3.1.0
ISC/Kea 3.1.1 - 3.1.2
Published Oct 29, 2025
Tracked Since Feb 18, 2026