We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Reserved 2025-05-06 | Published 2025-06-17 | Updated 2025-06-17 | Assigner redhatInsufficient Granularity of Access Control
2025-05-06: | Reported to Red Hat. |
2025-06-17: | Made public. |
Red Hat would like to thank Mikhail Sukhov (Positive Technologies) for reporting this issue.
access.redhat.com/errata/RHSA-2025:9184 (RHSA-2025:9184)
access.redhat.com/errata/RHSA-2025:9185 (RHSA-2025:9185)
access.redhat.com/errata/RHSA-2025:9186 (RHSA-2025:9186)
access.redhat.com/errata/RHSA-2025:9187 (RHSA-2025:9187)
access.redhat.com/errata/RHSA-2025:9188 (RHSA-2025:9188)
access.redhat.com/errata/RHSA-2025:9189 (RHSA-2025:9189)
access.redhat.com/errata/RHSA-2025:9190 (RHSA-2025:9190)
access.redhat.com/errata/RHSA-2025:9191 (RHSA-2025:9191)
access.redhat.com/errata/RHSA-2025:9192 (RHSA-2025:9192)
access.redhat.com/errata/RHSA-2025:9193 (RHSA-2025:9193)
access.redhat.com/errata/RHSA-2025:9194 (RHSA-2025:9194)
access.redhat.com/security/cve/CVE-2025-4404
bugzilla.redhat.com/show_bug.cgi?id=2364606 (RHBZ#2364606)
Support options