loader image
ISC logo on blue circle, related to ISC Fixes Kea DHCPv4 Bug cybersecurity update.
ISC Fixes Kea DHCPv4 Bug That Lets Attackers Crash Server

The Internet Systems Consortium has released a patch for a high-severity vulnerability in the Kea DHCPv4 server that could allow attackers to crash the service using a specially crafted hostname. Tracked as CVE-2025-11232 and rated 7.5 on the CVSS scale, the flaw poses a significant risk to network stability. ISC fixes Kea DHCPv4 bug in response to this denial-of-service vulnerability, which impacts deployments relying on the DHCPv4 protocol to manage IP address assignments.

According to the advisory, a malformed hostname can trigger an unexpected failure in affected versions, leading to service disruption. Administrators are urged to update to the latest version immediately to mitigate risks. ISC fixes Kea DHCPv4 bug by addressing the input handling weakness that made the crash possible. The advisory also references several other CVEs, highlighting broader security concerns across multiple components.

For more details, read the full advisory at

ISC Patches High-Severity Kea DHCPv4 DoS (CVE-2025-11232) Flaw, Allows Crash via Malformed Hostname

Write a Reply or Comment

Your email address will not be published. Required fields are marked *