Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error.
This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

Upgrade to the patched release most closely related to your current version of Kea: 2.6.5 or 3.0.3.


Workaround

Securing the API sockets with TLS, and requiring the client to authenticate with a certificate (mutual authentication), prevents the attacker from establishing an API connection to Kea. Set cert-required to true (the default) to require a client certificate. See: https://kea.readthedocs.io/en/stable/arm/security.html#tls-https-configuration

History

Wed, 25 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
Title Stack overflow in Kea daemons
First Time appeared Isc
Isc kea
Weaknesses CWE-617
CPEs cpe:2.3:a:isc:kea:*:*:*:*:*:*:*:*
Vendors & Products Isc
Isc kea
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2026-03-25T08:46:48.992Z

Reserved: 2026-03-05T17:47:36.088Z

Link: CVE-2026-3608

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-25T09:16:25.810

Modified: 2026-03-25T09:16:25.810

Link: CVE-2026-3608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses