Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet

Posted on August 28, 2025August 28, 2025 By CWS

A newly disclosed vulnerability within the broadly used ISC Kea DHCP server poses a big safety threat to community infrastructure worldwide. 

The flaw, designated CVE-2025-40779, permits distant attackers to crash DHCP companies with only a single maliciously crafted packet, doubtlessly disrupting community operations throughout total organizations.

The vulnerability impacts a number of variations of the Kea DHCP server, together with variations 2.7.1 via 2.7.9, 3.0.0, and three.1.0. 

Key Takeaways1. CVE-2025-40779 lets attackers crash Kea DHCPv4 with one crafted unicast packet.2. Impacts Kea 2.7.1–2.7.9, 3.0.0, 3.1.0; CVSS 7.5; no workaround.3. Improve instantly.

Community directors operating these variations face speedy publicity to denial-of-service assaults that require no authentication or particular privileges to execute.

Kea DHCP Server DoS Vulnerability

The vulnerability stems from an assertion failure within the kea-dhcp4 course of when particular consumer choices work together with the subnet choice mechanism. 

When a DHCPv4 consumer transmits a request containing explicit possibility mixtures, and the Kea server fails to find an acceptable subnet for that consumer, the service terminates unexpectedly with a deadly assertion error.

The assault vector is especially regarding as a result of it solely impacts unicast messages despatched on to the Kea server. 

Broadcast DHCP messages, which symbolize regular community visitors, don’t set off this vulnerability. This specificity means that attackers may intentionally goal DHCP servers with exactly crafted unicast packets designed to use this weak point.

The Widespread Vulnerability Scoring System (CVSS) has assigned this flaw a rating of seven.5, categorizing it as excessive severity. 

The CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H signifies that the vulnerability will be exploited remotely with low complexity, requires no privileges or person interplay, and leads to excessive availability influence.

The vulnerability was found via collaborative safety analysis, with acknowledgments going to Jochen M., Martin Dinev from Trading212, Ashwani Kumar from the Put up Graduate Institute of Medical Schooling & Analysis in Chandigarh, India, Bret Giddings from the College of Essex, and Florian Ritterhoff from Munich College of Utilized Sciences.

Threat FactorsDetailsAffected ProductsKea 2.7.1 – 2.7.93.0.03.1.0ImpactDenial of ServiceExploit PrerequisitesRemote unicast DHCPv4 request with particular consumer possibility setCVSS 3.1 Score7.5 (Excessive)

Mitigations

ISC has launched patched variations to handle this vital vulnerability. Organizations should instantly improve to Kea model 3.0.1 or 3.1.1, relying on their present deployment. 

No workarounds exist for this vulnerability, making speedy patching the one viable protection technique.

Community directors ought to prioritize this replace, as DHCP companies symbolize vital infrastructure parts. 

A profitable assault may render total community segments unable to acquire IP addresses, successfully creating widespread connectivity outages. 

Whereas ISC stories no recognized lively exploits, the simplicity of the assault vector makes this vulnerability a pretty goal for malicious actors searching for to disrupt community operations.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attacker, Crafted, Crash, DHCP, Kea, Packet, Remote, Server, Single, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Tactics
Next Post: TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures

Related Posts

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
  • Nevada IT Systems Hit by Cyberattack
  • Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
  • China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years
  • FreePBX Servers Hacked in 0-day Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
  • Nevada IT Systems Hit by Cyberattack
  • Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
  • China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years
  • FreePBX Servers Hacked in 0-day Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News