Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet

Posted on August 28, 2025August 28, 2025 By CWS

A newly disclosed vulnerability within the broadly used ISC Kea DHCP server poses a big safety threat to community infrastructure worldwide. 

The flaw, designated CVE-2025-40779, permits distant attackers to crash DHCP companies with only a single maliciously crafted packet, doubtlessly disrupting community operations throughout total organizations.

The vulnerability impacts a number of variations of the Kea DHCP server, together with variations 2.7.1 via 2.7.9, 3.0.0, and three.1.0. 

Key Takeaways1. CVE-2025-40779 lets attackers crash Kea DHCPv4 with one crafted unicast packet.2. Impacts Kea 2.7.1–2.7.9, 3.0.0, 3.1.0; CVSS 7.5; no workaround.3. Improve instantly.

Community directors operating these variations face speedy publicity to denial-of-service assaults that require no authentication or particular privileges to execute.

Kea DHCP Server DoS Vulnerability

The vulnerability stems from an assertion failure within the kea-dhcp4 course of when particular consumer choices work together with the subnet choice mechanism. 

When a DHCPv4 consumer transmits a request containing explicit possibility mixtures, and the Kea server fails to find an acceptable subnet for that consumer, the service terminates unexpectedly with a deadly assertion error.

The assault vector is especially regarding as a result of it solely impacts unicast messages despatched on to the Kea server. 

Broadcast DHCP messages, which symbolize regular community visitors, don’t set off this vulnerability. This specificity means that attackers may intentionally goal DHCP servers with exactly crafted unicast packets designed to use this weak point.

The Widespread Vulnerability Scoring System (CVSS) has assigned this flaw a rating of seven.5, categorizing it as excessive severity. 

The CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H signifies that the vulnerability will be exploited remotely with low complexity, requires no privileges or person interplay, and leads to excessive availability influence.

The vulnerability was found via collaborative safety analysis, with acknowledgments going to Jochen M., Martin Dinev from Trading212, Ashwani Kumar from the Put up Graduate Institute of Medical Schooling & Analysis in Chandigarh, India, Bret Giddings from the College of Essex, and Florian Ritterhoff from Munich College of Utilized Sciences.

Threat FactorsDetailsAffected ProductsKea 2.7.1 – 2.7.93.0.03.1.0ImpactDenial of ServiceExploit PrerequisitesRemote unicast DHCPv4 request with particular consumer possibility setCVSS 3.1 Score7.5 (Excessive)

Mitigations

ISC has launched patched variations to handle this vital vulnerability. Organizations should instantly improve to Kea model 3.0.1 or 3.1.1, relying on their present deployment. 

No workarounds exist for this vulnerability, making speedy patching the one viable protection technique.

Community directors ought to prioritize this replace, as DHCP companies symbolize vital infrastructure parts. 

A profitable assault may render total community segments unable to acquire IP addresses, successfully creating widespread connectivity outages. 

Whereas ISC stories no recognized lively exploits, the simplicity of the assault vector makes this vulnerability a pretty goal for malicious actors searching for to disrupt community operations.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attacker, Crafted, Crash, DHCP, Kea, Packet, Remote, Server, Single, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Tactics
Next Post: TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures

Related Posts

Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code Cyber Security News
CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday Cyber Security News
ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
25 Best Managed Security Service Providers (MSSP) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Metadata in Shared Files
  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Metadata in Shared Files
  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News