Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3576: Use of Weak Hash

0
Medium
VulnerabilityCVE-2025-3576cvecve-2025-3576
Published: Tue Apr 15 2025 (04/15/2025, 05:55:26 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

AI-Powered Analysis

AILast updated: 01/27/2026, 19:09:25 UTC

Technical Analysis

CVE-2025-3576 identifies a cryptographic weakness in the MIT Kerberos implementation, specifically when GSSAPI-protected messages use the RC4-HMAC-MD5 encryption type. The vulnerability stems from the inherent weaknesses in the MD5 hashing algorithm, which is susceptible to collision attacks. An attacker who can induce or predict MD5 collisions can forge message integrity codes (MICs), effectively spoofing the authenticity of messages protected by this mechanism. This flaw allows unauthorized modification or tampering of messages without detection, undermining the integrity guarantees of Kerberos authentication and communication. The vulnerability is present in Red Hat Enterprise Linux 10, where RC4-HMAC-MD5 is still preferred over stronger encryption types. Exploitation does not require prior authentication or user interaction but does require the attacker to influence or intercept the communication using the weak encryption. The attack complexity is high due to the need to exploit MD5 collisions effectively. No known exploits have been reported in the wild yet, but the vulnerability is publicly disclosed and rated with a CVSS 3.1 base score of 5.9, indicating medium severity. The issue highlights the ongoing risks of legacy cryptographic algorithms in modern secure communications.

Potential Impact

For European organizations, the primary impact of CVE-2025-3576 is the potential compromise of message integrity within Kerberos-authenticated sessions that use RC4-HMAC-MD5. This can lead to unauthorized tampering of sensitive communications, potentially affecting identity verification, access control decisions, and secure data exchanges. Critical sectors such as government, finance, telecommunications, and energy that rely on Kerberos for secure authentication and message protection could face increased risks of undetected message forgery. While confidentiality and availability are not directly impacted, the integrity breach could facilitate further attacks such as privilege escalation or unauthorized access if attackers manipulate authentication tokens or authorization data. The medium severity and absence of known exploits suggest a moderate immediate risk, but organizations using legacy configurations or failing to disable weak encryption remain vulnerable. The impact is heightened in environments with high-value targets or regulatory requirements for data integrity and secure authentication.

Mitigation Recommendations

European organizations should immediately audit their Kerberos configurations to identify if RC4-HMAC-MD5 is enabled or preferred. They should disable RC4-HMAC-MD5 and enforce the use of stronger encryption types such as AES-based algorithms (e.g., AES256-CTS-HMAC-SHA1-96). Applying all relevant security patches from Red Hat as they become available is critical, even though no patches are currently listed, monitoring vendor advisories is necessary. Network monitoring should be enhanced to detect anomalous GSSAPI traffic or signs of message tampering. Organizations should also review and update their cryptographic policies to phase out legacy algorithms like MD5 and RC4 across all systems. Where possible, implement multi-factor authentication and additional integrity checks at application layers to mitigate risks from compromised Kerberos message integrity. Training and awareness for security teams on cryptographic vulnerabilities and secure Kerberos deployment best practices will further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-14T09:53:43.906Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f2fb50acd01a24925c8e2

Added to database: 5/22/2025, 2:07:49 PM

Last enriched: 1/27/2026, 7:09:25 PM

Last updated: 2/4/2026, 9:57:55 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats