Categories: Cyber Security News

ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services Remotely

The Internet Systems Consortium (ISC) has released a critical security advisory warning network administrators of a high-severity vulnerability affecting the Kea DHCP server.

Tracked as CVE-2026-3608, this flaw allows unauthenticated remote attackers to trigger a stack overflow error.

When successfully exploited, the vulnerability causes the receiving daemon to crash, resulting in a sudden and total loss of DHCP services across the network.

Kea DHCP Vulnerability

The vulnerability exists in how Kea daemons process incoming messages over specific listening channels.

An attacker can exploit this weakness by sending a maliciously crafted message over any configured API socket or High Availability (HA) listener.

Because the incoming payload is not handled correctly by the software, a stack overflow occurs, forcing the service to terminate unexpectedly.

This issue impacts multiple core components of the Kea architecture. The advisory explicitly notes that the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, and kea-dhcp6 daemons are all susceptible to this attack.

Ali Norouzi from Keysight is credited with discovering and responsibly reporting the issue to the ISC. Carrying a CVSS v3.1 score of 7.5, CVE-2026-3608 represents a significant threat to network stability.

The vulnerability requires zero user interaction and no elevated privileges, meaning any bad actor with network access to the API sockets can trigger the crash.

The primary consequence of this exploit is a severe denial-of-service condition.

When the Kea daemons exit, the network immediately loses its DHCP capabilities, which can disrupt IP address assignment, break network connectivity for new devices, and severely impact enterprise operations.

Fortunately, the ISC has stated that they are currently unaware of any active exploits in the wild.

Mitigations and Workarounds

To permanently resolve this vulnerability, the ISC strongly advises organizations to immediately upgrade their Kea deployments to the latest patched releases.

Administrators running the 2.6 branch should update to Kea 2.6.5. In comparison, those on the 3.0 branch must update to Kea 3.0.3 to secure their environments against potential denial-of-service attacks.

For network administrators who are unable to patch their systems right away, the ISC has provided an effective temporary workaround.

Organizations can block the exploitation path by securing their API sockets with Transport Layer Security (TLS) and enforcing strict mutual authentication.

By configuring the server to require a valid client certificate, administrators ensure that an attacker cannot establish the initial API connection required to deliver the malicious payload.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services Remotely appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Hackers Use Phishing ZIP Files to Deploy PXA Stealer Against Financial Firms

A new wave of cyberattacks is putting financial institutions on high alert, as threat actors…

4 minutes ago

Telnyx PyPI Package With 742,000 downloads Compromised in TeamPCP Supply Chain Attack

The official Telnyx Python SDK on PyPI was compromised this morning as part of an…

4 minutes ago

Red Hat Warns of Malware Code Embedded in Popular Linux Tool Allow Unauthorized Access to Systems

Red Hat has issued a critical security warning regarding malicious code discovered in recent versions…

4 minutes ago

Critical Citrix NetScaler and Gateway Vulnerabilities Let Remote Attackers Leak Sensitive Information

Cloud Software Group has issued a critical security bulletin detailing two newly discovered vulnerabilities affecting…

5 minutes ago

Fort Wayne Woman Arrested, Boyfriend Charged in Shooting Over Bracelet Dispute

FORT WAYNE, Ind. (WOWO)— A Fort Wayne man is recovering after being shot, and police…

15 minutes ago

Hendersonville didn’t win The Boring Company’s contest, but may still partner to bury utility lines

Elon Musk's The Boring Company did not select any Tennessee cities for its Tunnel Vision…

19 minutes ago

This website uses cookies.