Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4404: Insufficient Granularity of Access Control

0
Critical
VulnerabilityCVE-2025-4404cvecve-2025-4404
Published: Tue Jun 17 2025 (06/17/2025, 13:39:17 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:52:35 UTC

Technical Analysis

CVE-2025-4404 is a critical vulnerability discovered in the FreeIPA project, specifically affecting Red Hat Enterprise Linux 10. The root cause is insufficient granularity in access control related to the krbCanonicalName attribute used for Kerberos authentication. FreeIPA fails to enforce uniqueness of the krbCanonicalName for the admin account by default, which allows an attacker with some level of privilege on the host to create a service principal with the same canonical name as the REALM admin. This misconfiguration enables the attacker to request and obtain a Kerberos ticket that effectively impersonates the admin@REALM principal. With this ticket, the attacker gains administrative privileges over the entire Kerberos REALM, allowing them to perform administrative tasks, access sensitive data, and exfiltrate information. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), and privileges at the host level (PR:H), but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The CVSS 3.1 score is 9.1, indicating critical severity. Although no known exploits are currently reported in the wild, the impact potential is severe due to the administrative level access gained. The vulnerability highlights a fundamental flaw in FreeIPA's access control validation mechanisms, necessitating urgent remediation.

Potential Impact

The impact of CVE-2025-4404 is severe for organizations using FreeIPA for identity and access management, particularly on Red Hat Enterprise Linux 10 systems. Successful exploitation grants attackers administrative control over the Kerberos REALM, enabling them to manipulate authentication and authorization processes. This can lead to unauthorized access to sensitive systems and data, disruption of authentication services, and potential lateral movement within the network. The ability to exfiltrate sensitive data and perform administrative tasks undermines the confidentiality, integrity, and availability of critical infrastructure. Organizations relying on FreeIPA for centralized authentication in enterprise environments, government, and critical infrastructure sectors face significant risk. The vulnerability could facilitate advanced persistent threats (APTs) and insider threats, making detection and remediation challenging. Given the widespread use of Red Hat Enterprise Linux in enterprise and cloud environments, the scope of affected systems is broad, increasing the potential for large-scale compromise if exploited.

Mitigation Recommendations

To mitigate CVE-2025-4404, organizations should immediately apply any patches or updates provided by Red Hat or the FreeIPA project once available. Until patches are released, administrators should enforce strict controls on service principal creation, limiting it to trusted users and processes. Audit existing service principals for duplicate krbCanonicalName values and remove or rename any conflicting entries. Implement enhanced monitoring of Kerberos ticket requests and authentication logs to detect anomalous activity indicative of impersonation attempts. Employ network segmentation and least privilege principles to reduce the risk of privilege escalation from host-level access. Consider deploying multi-factor authentication (MFA) for administrative accounts to add an additional security layer. Regularly review and update FreeIPA configurations to ensure compliance with security best practices. Finally, conduct thorough incident response planning and readiness to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-06T22:17:12.623Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68517269a8c921274385c3c1

Added to database: 6/17/2025, 1:49:29 PM

Last enriched: 3/6/2026, 8:52:35 PM

Last updated: 3/25/2026, 1:43:27 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses