Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet

Posted on August 28, 2025August 28, 2025 By CWS

A newly disclosed vulnerability within the broadly used ISC Kea DHCP server poses a big safety threat to community infrastructure worldwide. 

The flaw, designated CVE-2025-40779, permits distant attackers to crash DHCP companies with only a single maliciously crafted packet, doubtlessly disrupting community operations throughout total organizations.

The vulnerability impacts a number of variations of the Kea DHCP server, together with variations 2.7.1 via 2.7.9, 3.0.0, and three.1.0. 

Key Takeaways1. CVE-2025-40779 lets attackers crash Kea DHCPv4 with one crafted unicast packet.2. Impacts Kea 2.7.1–2.7.9, 3.0.0, 3.1.0; CVSS 7.5; no workaround.3. Improve instantly.

Community directors operating these variations face speedy publicity to denial-of-service assaults that require no authentication or particular privileges to execute.

Kea DHCP Server DoS Vulnerability

The vulnerability stems from an assertion failure within the kea-dhcp4 course of when particular consumer choices work together with the subnet choice mechanism. 

When a DHCPv4 consumer transmits a request containing explicit possibility mixtures, and the Kea server fails to find an acceptable subnet for that consumer, the service terminates unexpectedly with a deadly assertion error.

The assault vector is especially regarding as a result of it solely impacts unicast messages despatched on to the Kea server. 

Broadcast DHCP messages, which symbolize regular community visitors, don’t set off this vulnerability. This specificity means that attackers may intentionally goal DHCP servers with exactly crafted unicast packets designed to use this weak point.

The Widespread Vulnerability Scoring System (CVSS) has assigned this flaw a rating of seven.5, categorizing it as excessive severity. 

The CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H signifies that the vulnerability will be exploited remotely with low complexity, requires no privileges or person interplay, and leads to excessive availability influence.

The vulnerability was found via collaborative safety analysis, with acknowledgments going to Jochen M., Martin Dinev from Trading212, Ashwani Kumar from the Put up Graduate Institute of Medical Schooling & Analysis in Chandigarh, India, Bret Giddings from the College of Essex, and Florian Ritterhoff from Munich College of Utilized Sciences.

Threat FactorsDetailsAffected ProductsKea 2.7.1 – 2.7.93.0.03.1.0ImpactDenial of ServiceExploit PrerequisitesRemote unicast DHCPv4 request with particular consumer possibility setCVSS 3.1 Score7.5 (Excessive)

Mitigations

ISC has launched patched variations to handle this vital vulnerability. Organizations should instantly improve to Kea model 3.0.1 or 3.1.1, relying on their present deployment. 

No workarounds exist for this vulnerability, making speedy patching the one viable protection technique.

Community directors ought to prioritize this replace, as DHCP companies symbolize vital infrastructure parts. 

A profitable assault may render total community segments unable to acquire IP addresses, successfully creating widespread connectivity outages. 

Whereas ISC stories no recognized lively exploits, the simplicity of the assault vector makes this vulnerability a pretty goal for malicious actors searching for to disrupt community operations.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attacker, Crafted, Crash, DHCP, Kea, Packet, Remote, Server, Single, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Tactics
Next Post: TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures

Related Posts

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Cyber Security News
CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks Cyber Security News
CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks Cyber Security News
Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity
  • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
  • SonicWall SSL VPN Accounts in Attacker Crosshairs
  • Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity
  • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
  • SonicWall SSL VPN Accounts in Attacker Crosshairs
  • Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News