Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59088: Server-Side Request Forgery (SSRF) in latchset kdcproxy

0
High
VulnerabilityCVE-2025-59088cvecve-2025-59088
Published: Wed Nov 12 2025 (11/12/2025, 16:35:27 UTC)
Source: CVE Database V5
Vendor/Project: latchset
Product: kdcproxy

Description

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:59:22 UTC

Technical Analysis

The latchset kdcproxy component is vulnerable to a Server-Side Request Forgery (SSRF) issue identified as CVE-2025-59088. The vulnerability arises when kdcproxy processes requests for Kerberos realms that do not have explicitly configured server addresses. In such cases, kdcproxy automatically queries DNS SRV records within the DNS zone corresponding to the requested realm name. This default behavior allows an attacker to craft a request for a realm name under their control, where they have created malicious SRV records pointing to arbitrary hostnames and ports. These hostnames can resolve to internal IP addresses, loopback interfaces, or other sensitive network resources. As a result, the attacker can coerce kdcproxy into making network connections to internal systems that would otherwise be inaccessible externally. This can be exploited to perform internal network reconnaissance, including mapping network topology and firewall rules, conducting port scans, and potentially exfiltrating sensitive information by leveraging the proxy's network access. The vulnerability does not require any authentication or user interaction, increasing its exploitability. However, if the "use_dns" configuration option is explicitly set to false, kdcproxy will not perform these DNS SRV queries, mitigating the vulnerability. The CVSS v3.1 base score is 8.6, reflecting a high severity with network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change affecting confidentiality. No public exploits have been reported as of the publication date.

Potential Impact

This vulnerability poses a significant risk to organizations deploying latchset kdcproxy, especially in environments where internal network segmentation and firewall rules are critical for security. Exploitation can lead to unauthorized internal network reconnaissance, revealing sensitive infrastructure details that can facilitate subsequent attacks. Attackers may identify open ports, services, and network configurations that are otherwise hidden from external view. Additionally, the ability to exfiltrate data through the proxy could compromise confidentiality of sensitive information. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers, increasing the attack surface. Organizations relying on kdcproxy for Kerberos authentication proxying should consider this a high-risk issue, particularly in sectors with stringent security requirements such as government, finance, and critical infrastructure. The lack of known exploits in the wild currently limits immediate risk, but the potential for impactful attacks remains high.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if the "use_dns" setting in kdcproxy is explicitly set to false, as this disables the vulnerable DNS SRV record querying behavior. If not already configured, administrators should disable this setting to prevent SSRF exploitation. Additionally, network-level controls should be implemented to restrict kdcproxy's ability to initiate arbitrary outbound connections, such as firewall rules limiting egress traffic to only trusted destinations. Monitoring DNS zones and SRV records for unauthorized changes can help detect potential attacker-controlled domains. Applying any available patches or updates from the latchset project as they become available is critical. In the absence of patches, consider isolating kdcproxy instances in segmented network zones with strict access controls. Regular security assessments and penetration testing focused on internal network exposure via proxy services can help identify and remediate similar risks. Finally, logging and alerting on unusual kdcproxy DNS queries or outbound connections can provide early detection of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-09-08T21:43:30.845Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914c133f490e7dc3cc5b76c

Added to database: 11/12/2025, 5:17:39 PM

Last enriched: 2/27/2026, 2:59:22 PM

Last updated: 3/28/2026, 9:09:03 AM

Views: 198

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses