A newly revealed security flaw in the ISC Kea DHCP server has raised serious concerns for organizations worldwide. Tracked as CVE-2025-40779, this vulnerability allows remote attackers to crash DHCPv4 services using a single specially crafted unicast packet, leading to potential large-scale network disruptions.
Key Points
- CVE-2025-40779 enables attackers to crash Kea DHCPv4 with a single malicious unicast request.
- Affects Kea versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0.
- Rated 7.5 (High) under CVSS 3.1, with no workarounds available.
- Immediate upgrade is strongly advised.
Technical Details
The flaw arises from an assertion failure in the kea-dhcp4 process. When certain client options interact with the subnet selection mechanism and no matching subnet is found, the service terminates with a fatal error.
Unlike typical DHCP broadcast requests, this bug is triggered only by direct unicast packets. This makes it possible for attackers to intentionally craft malicious DHCPv4 packets and cause a denial-of-service (DoS) attack without authentication or elevated privileges.
Severity and Risk Assessment
- CVSS Score: 7.5 (High)
- Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Impact: Denial of Service (DoS)
- Prerequisites: Remote unicast DHCPv4 request with specific client options
This vulnerability does not compromise confidentiality or integrity, but it significantly impacts availability. A successful attack could prevent devices from obtaining IP addresses, effectively disrupting network connectivity across entire organizations.
Affected Versions
- Kea 2.7.1 – 2.7.9
- Kea 3.0.0
- Kea 3.1.0
Credits
The vulnerability was identified through collaborative research efforts. Acknowledgments go to:
- Jochen M.
- Martin Dinev (Trading212)
- Ashwani Kumar (PGIMER Chandigarh, India)
- Bret Giddings (University of Essex)
- Florian Ritterhoff (Munich University of Applied Sciences)
Mitigation and Recommendations
There are no temporary workarounds for CVE-2025-40779. ISC has released patched versions (3.0.1 and 3.1.1) that resolve this flaw.
Action Required:
- Upgrade to Kea 3.0.1 or 3.1.1 immediately.
- Monitor your DHCP servers for unusual unicast traffic.
- Treat this update as a priority, since DHCP is a critical network infrastructure service.
Although no active exploits have been reported, the simplicity of the attack makes it highly attractive for malicious actors aiming to disrupt operations.


