Skip to main content

CVE-2025-3576: Use of Weak Hash

Medium
VulnerabilityCVE-2025-3576cvecve-2025-3576
Published: Tue Apr 15 2025 (04/15/2025, 05:55:26 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

AI-Powered Analysis

AILast updated: 07/29/2025, 00:59:17 UTC

Technical Analysis

CVE-2025-3576 is a medium-severity vulnerability affecting the MIT Kerberos implementation used in Red Hat Enterprise Linux 10. The vulnerability arises from the use of the RC4-HMAC-MD5 encryption type within GSSAPI-protected messages. Specifically, the weakness lies in the MD5 checksum algorithm, which is known to be susceptible to collision attacks. When RC4 is preferred over stronger encryption algorithms, an attacker can exploit the MD5 collision vulnerability to forge message integrity codes, effectively allowing spoofing of GSSAPI-protected messages. This undermines the integrity of the communication, enabling unauthorized message tampering without requiring authentication or user interaction. The vulnerability does not impact confidentiality or availability directly but compromises message integrity, which can lead to further exploitation or unauthorized actions within Kerberos-authenticated sessions. The CVSS 3.1 base score is 5.9 (medium), reflecting the network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to integrity. No known exploits are currently reported in the wild, and no patches are explicitly linked yet, indicating that mitigation may require configuration changes or updates once available.

Potential Impact

For European organizations, especially those relying on Red Hat Enterprise Linux 10 and Kerberos for authentication and secure communications, this vulnerability poses a risk of message tampering within internal or external authentication workflows. Compromised message integrity can lead to unauthorized command execution, privilege escalation, or lateral movement within networks. Sectors such as finance, government, healthcare, and critical infrastructure, which often use Kerberos for secure authentication, could see increased risk of targeted attacks exploiting this vulnerability. The impact is heightened in environments where RC4-HMAC-MD5 remains enabled or preferred due to legacy system compatibility. Given the medium severity and absence of confidentiality or availability impact, the threat is significant but not critical. However, the potential for attackers to manipulate authentication messages could facilitate broader attacks, making timely mitigation important.

Mitigation Recommendations

Organizations should audit their Kerberos configurations to identify if RC4-HMAC-MD5 is enabled or preferred. It is recommended to disable RC4-HMAC-MD5 and enforce stronger encryption types such as AES-based algorithms (AES256-CTS-HMAC-SHA1-96 or AES128-CTS-HMAC-SHA1-96) in Kerberos settings. Updating Red Hat Enterprise Linux 10 to the latest security patches once available is essential. Network segmentation and monitoring of Kerberos traffic for anomalies can help detect exploitation attempts. Additionally, organizations should review and update their cryptographic policies to phase out legacy algorithms like MD5 and RC4. Employing multi-factor authentication and limiting the use of GSSAPI where possible can further reduce risk. Finally, maintaining up-to-date threat intelligence and applying vendor advisories promptly will help mitigate this vulnerability effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-14T09:53:43.906Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f2fb50acd01a24925c8e2

Added to database: 5/22/2025, 2:07:49 PM

Last enriched: 7/29/2025, 12:59:17 AM

Last updated: 8/8/2025, 10:16:26 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats