- ISC Kea versions 2.4.0 -> 2.4.1
- ISC Kea versions 2.6.0 -> 2.6.2
- ISC Kea versions 2.7.0 -> 2.7.8
Note: (Versions prior to 2.4.0 were not assessed)
Multiple vulnerabilities have been reported in ISC Kea which could allow an attacker to execute arbitrary code, modify or access sensitive files, escalate privileges and potentially cause denial of service on the targeted system.
Target Audience:
All end-user organizations and individuals using ISC Kea.
Risk Assessment:
Execute arbitrary code, modify or access sensitive files, escalate privileges and potentially cause denial of service.
Impact Assessment:
Authoritative servers and Resolvers are affected by these vulnerabilities.
The information provided herein is on "as is" basis, without warranty of any kind.