Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3183: Use of Password Hash With Insufficient Computational Effort

0
High
VulnerabilityCVE-2024-3183cvecve-2024-3183
Published: Wed Jun 12 2024 (06/12/2024, 08:18:51 UTC)
Source: CVE Database V5

Description

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:40:23 UTC

Technical Analysis

CVE-2024-3183 identifies a cryptographic weakness in FreeIPA's handling of Kerberos TGS-REQ messages. Normally, these requests are encrypted with the client’s session key, which changes each session and protects against brute force attacks. However, the ticket inside the TGS-REQ is encrypted using the target principal’s key directly. For user principals, this key is derived from a hash of a public, per-principal randomly generated salt combined with the user's password. This hash does not employ sufficient computational effort (e.g., slow hashing algorithms like PBKDF2, bcrypt, or Argon2) to resist offline brute force attacks. If an attacker compromises a principal, they can collect encrypted tickets and salts offline and attempt to brute force the password hashes to recover the original passwords. This compromises the confidentiality and integrity of the authentication process, enabling attackers to impersonate users and access sensitive resources. The vulnerability does not require user interaction but does require some level of privilege (PR:L) to exploit, as indicated by the CVSS vector. The vulnerability is rated high severity with a CVSS score of 8.1, reflecting its potential impact on confidentiality and integrity without affecting availability. No patches or exploits are currently documented, but the risk remains significant due to the nature of the cryptographic weakness.

Potential Impact

The primary impact of CVE-2024-3183 is the potential compromise of user credentials within FreeIPA-managed environments. Successful exploitation allows attackers to perform offline brute force attacks against password hashes derived from encrypted Kerberos tickets, potentially recovering user passwords. This can lead to unauthorized access, privilege escalation, and lateral movement within an organization's network. Confidentiality is severely impacted as attackers can decrypt sensitive tickets and impersonate users. Integrity is also at risk because attackers can forge authentication tokens. Although availability is not directly affected, the breach of authentication mechanisms can lead to broader security incidents, including data breaches and disruption of services. Organizations relying on FreeIPA for identity and access management, especially those in sectors with sensitive data or critical infrastructure, face significant risks. The vulnerability could undermine trust in authentication systems and lead to regulatory and compliance consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2024-3183, organizations should prioritize applying any available patches or updates from FreeIPA or Red Hat as soon as they are released. In the absence of immediate patches, administrators should enforce strong password policies to increase the complexity and length of user passwords, making brute force attacks more difficult. Implementing multi-factor authentication (MFA) can reduce the risk of credential compromise. Monitoring and alerting on unusual authentication patterns or repeated failed attempts can help detect brute force activities early. Additionally, consider limiting the exposure of Kerberos tickets and salts by restricting access to sensitive authentication data and employing network segmentation. Using stronger key derivation functions with higher computational effort for password hashing within FreeIPA would be a long-term fix. Regularly auditing and rotating credentials, combined with user education on password hygiene, will further reduce risk. Finally, organizations should review their incident response plans to quickly address any potential compromise stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-04-02T09:48:54.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3739f5a9374a9d10fe8

Added to database: 11/20/2025, 7:29:55 AM

Last enriched: 2/28/2026, 4:40:23 AM

Last updated: 3/26/2026, 4:50:10 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses