CVE-2025-40779

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in ISC Kea DHCPv4 server where a malicious DHCP client sending unicast requests with specific options can cause the kea-dhcp4 process to crash via assertion failure. This affects Kea DHCP servers running vulnerable versions when processing direct unicast client requests.

💻 Affected Systems

Products:
  • ISC Kea DHCP Server
Versions: 2.7.1 through 2.7.9, 3.0.0, and 3.1.0
Operating Systems: All platforms running Kea DHCP
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects unicast DHCPv4 requests; broadcast messages are not vulnerable. Requires attacker to send specific DHCP options that trigger subnet lookup failure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete DHCP service outage requiring manual restart of kea-dhcp4 process, disrupting network connectivity for all DHCP clients.

🟠

Likely Case

Intermittent DHCP service disruption affecting clients attempting to obtain or renew leases during attack periods.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and respond to crashes quickly.

🌐 Internet-Facing: MEDIUM - Requires attacker to send unicast DHCP packets to server, which is possible if DHCP server is exposed to untrusted networks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could disrupt DHCP services affecting network operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted DHCPv4 unicast packets with specific options. No authentication needed as DHCP is typically unauthenticated protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.10, 3.1.1, or later versions

Vendor Advisory: https://kb.isc.org/docs/cve-2025-40779

Restart Required: Yes

Instructions:

1. Backup current Kea configuration. 2. Upgrade to patched version using package manager (apt/yum) or compile from source. 3. Restart kea-dhcp4 service: systemctl restart kea-dhcp4. 4. Verify service is running and clients can obtain leases.

🔧 Temporary Workarounds

Block Unicast DHCP Requests

linux

Configure firewall to block unicast DHCP requests from untrusted sources while allowing broadcast DHCP traffic.

iptables -A INPUT -p udp --dport 67 -s 0.0.0.0/0 -d <server_ip> -j DROP
iptables -A INPUT -p udp --dport 67 -s 255.255.255.255 -j ACCEPT

Implement DHCP Relay Protection

all

Configure network to only allow DHCP requests through trusted DHCP relay agents.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit which clients can send unicast DHCP requests to the server
  • Deploy monitoring and automated restart for kea-dhcp4 process to minimize service disruption

🔍 How to Verify

Check if Vulnerable:

Check Kea version: kea-dhcp4 --version. If version is between 2.7.1-2.7.9, 3.0.0, or 3.1.0, system is vulnerable.

Check Version:

kea-dhcp4 --version | grep -oP 'Kea DHCP \K[0-9.]+'

Verify Fix Applied:

After upgrade, verify version is 2.7.10+, 3.1.1+, or later. Test DHCP functionality with legitimate client requests.

📡 Detection & Monitoring

Log Indicators:

  • kea-dhcp4 process crash/restart logs
  • Assertion failure messages in Kea logs
  • DHCP service interruption alerts

Network Indicators:

  • Unusual unicast DHCP traffic patterns
  • DHCP DISCOVER/OFFER/REQUEST/ACK anomalies

SIEM Query:

process:kea-dhcp4 AND (event:crash OR event:restart) OR dhcp.request_type:unicast AND dhcp.options:*

🔗 References

📤 Share & Export