Critical Vulnerability in Kea DHCP Exposes Networks to Remote Attacks; Update Urgently Recommended

Critical Kea DHCP Vulnerability Exposes Networks to Remote Service Disruption

The Internet Systems Consortium (ISC) has issued a critical security advisory concerning a high-severity vulnerability in the Kea DHCP server, identified as CVE-2026-3608. This flaw enables unauthenticated remote attackers to induce a stack overflow error, leading to the abrupt termination of DHCP services and potentially causing widespread network disruptions.

Understanding the Vulnerability

The core issue lies in the Kea daemons’ processing of incoming messages over specific listening channels. An attacker can exploit this by sending a maliciously crafted message through any configured API socket or High Availability (HA) listener. Due to improper handling of the incoming payload, a stack overflow occurs, forcing the service to crash unexpectedly.

This vulnerability affects several key components of the Kea architecture, including the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, and kea-dhcp6 daemons. Ali Norouzi from Keysight is credited with discovering and responsibly reporting this issue to the ISC. With a CVSS v3.1 score of 7.5, CVE-2026-3608 poses a significant threat to network stability.

Potential Impact

Exploitation of this vulnerability requires no user interaction or elevated privileges, meaning any individual with network access to the API sockets can trigger the crash. The primary consequence is a severe denial-of-service condition. When the Kea daemons terminate, the network immediately loses its DHCP capabilities, disrupting IP address assignment, breaking network connectivity for new devices, and severely impacting enterprise operations.

Mitigation Strategies

To address this vulnerability, the ISC strongly recommends that organizations promptly upgrade their Kea deployments to the latest patched releases. Administrators using the 2.6 branch should update to Kea 2.6.5, while those on the 3.0 branch should upgrade to Kea 3.0.3 to secure their environments against potential denial-of-service attacks.

For those unable to apply patches immediately, the ISC suggests a temporary workaround: securing API sockets with Transport Layer Security (TLS) and enforcing strict mutual authentication. By configuring the server to require a valid client certificate, administrators can prevent attackers from establishing the initial API connection necessary to deliver the malicious payload.

Conclusion

The discovery of CVE-2026-3608 underscores the critical importance of proactive vulnerability management in maintaining network security. Organizations utilizing Kea DHCP servers must act swiftly to implement the recommended updates or workarounds to mitigate the risk of service disruption. Staying informed about such vulnerabilities and adhering to best practices in network security are essential steps in safeguarding against potential threats.