CVE-2025-11232
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-29

Last updated on: 2025-11-04

Assigner: Internet Systems Consortium (ISC)

Description
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-29
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-10-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
isc kea 3.1.2
isc kea 3.1.1
isc kea 3.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-823 The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Kea DHCP versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2 when three specific configuration parameters are set in a particular way: 'hostname-char-set' is left at its default value '[^A-Za-z0-9.-]', 'hostname-char-replacement' is empty (default), and 'ddns-qualifying-suffix' is not empty. Under these conditions, a client sending certain option content can cause the kea-dhcp4 service to exit unexpectedly, leading to a denial of service.


How can this vulnerability impact me? :

The vulnerability can cause the kea-dhcp4 service to crash unexpectedly, resulting in a denial of service (DoS). This means DHCP services may become unavailable, potentially disrupting network operations and connectivity for clients relying on DHCP.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart