CVE-2025-32801
CVSS Score
V3.1Attack Vector Metrics
Impact Metrics
Description
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Available Exploits
Related News
Posted by Matthias Gerstner on May 30Hi, I just checked this attack vector more closely. The resulting file receives the mode 0666, because bits missing in the `mode` argument passed to `openat()` are masked out. The strace of `kea-ctrl-agent` looks like th…
Posted by Matthias Gerstner on May 30Hi, very nice addition! We already felt like there was little left to succeed in the attack, but didn't think of ACLs. We will make an update to our blog post to reflect this. Cheers Matthias