{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-32803","assignerOrgId":"404fd4d2-a609-4245-b543-2c944a302a22","state":"PUBLISHED","assignerShortName":"isc","dateReserved":"2025-04-10T12:51:45.056Z","datePublished":"2025-05-28T17:08:20.769Z","dateUpdated":"2025-05-28T17:28:58.513Z"},"containers":{"cna":{"providerMetadata":{"orgId":"404fd4d2-a609-4245-b543-2c944a302a22","shortName":"isc","dateUpdated":"2025-05-28T17:08:20.769Z"},"title":"Insecure file permissions can result in confidential information leakage","datePublic":"2025-05-28T00:00:00.000Z","affected":[{"vendor":"ISC","product":"Kea","versions":[{"version":"2.4.0","lessThanOrEqual":"2.4.1","status":"affected","versionType":"custom"},{"version":"2.6.0","lessThanOrEqual":"2.6.2","status":"affected","versionType":"custom"},{"version":"2.7.0","lessThanOrEqual":"2.7.8","status":"affected","versionType":"custom"}],"defaultStatus":"unaffected"}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":4,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-276","description":"CWE-276 Incorrect Default Permissions"}]}],"descriptions":[{"lang":"en","value":"In some cases, Kea log files or lease files may be world-readable.\nThis issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8."}],"impacts":[{"descriptions":[{"lang":"en","value":"If an attacker has access to a local unprivileged user account, they would be able to read the logs and/or lease information.  This might disclose details about DHCP clients (MAC addresses, hostnames, IP addresses, configuration details, and so on), or about Kea itself."}]}],"workarounds":[{"lang":"en","value":"It is possible to work around this problem by ensuring that the directories that contain the logs and lease files are only accessible to trusted users."}],"exploits":[{"lang":"en","value":"We are not aware of any active exploits."}],"solutions":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of Kea: 2.4.2, 2.6.3, or 2.7.9."}],"credits":[{"lang":"en","value":"ISC would like to thank Matthias Gerstner from the SUSE security team for bringing this vulnerability to our attention."}],"references":[{"url":"https://kb.isc.org/docs/cve-2025-32803","name":"CVE-2025-32803","tags":["vendor-advisory"]}],"source":{"discovery":"EXTERNAL"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-28T17:28:47.543925Z","id":"CVE-2025-32803","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-28T17:28:58.513Z"}}]}}