Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea.  Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 17 Jun 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat Redhat enterprise Linux | |
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| Vendors & Products | Redhat Redhat enterprise Linux | 
Fri, 30 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-250 | |
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Wed, 28 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 28 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | |
| Title | Insecure handling of file paths allows multiple local attacks | |
| Weaknesses | CWE-379 CWE-73 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: isc
Published: 2025-05-28T17:08:11.180Z
Updated: 2025-05-28T17:23:22.213Z
Reserved: 2025-04-10T12:51:45.055Z
Link: CVE-2025-32802
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-05-28T17:23:12.869Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-05-28T17:15:23.890
Modified: 2025-05-29T14:29:50.247
Link: CVE-2025-32802
 Redhat
                        Redhat