Логотип exploitDog
bind:"CVE-2025-4404"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-4404"

Количество 10

Количество 10

ubuntu логотип

CVE-2025-4404

около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
EPSS: Низкий
redhat логотип

CVE-2025-4404

около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2025-4404

около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2025-4404

около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in ...

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-w66p-wgwc-mqmw

около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
EPSS: Низкий
oracle-oval логотип

ELSA-2025-9190

около 1 месяца назад

ELSA-2025-9190: ipa security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-9189

около 1 месяца назад

ELSA-2025-9189: ipa security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-9188

около 2 месяцев назад

ELSA-2025-9188: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-9184

около 2 месяцев назад

ELSA-2025-9184: ipa security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-04863

4 месяца назад

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с неправильным контролем доступа, позволяющая нарушителю повысить свои привилегии до уровня администратора домена и оказать воздействие на конфиденциальность целостность и доступость защищаемой информации

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-4404

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-4404

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-4404

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-4404

A privilege escalation from host to domain vulnerability was found in ...

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-w66p-wgwc-mqmw

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
oracle-oval логотип
ELSA-2025-9190

ELSA-2025-9190: ipa security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-9189

ELSA-2025-9189: ipa security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-9188

ELSA-2025-9188: idm:DL1 security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-9184

ELSA-2025-9184: ipa security update (IMPORTANT)

около 2 месяцев назад
fstec логотип
BDU:2025-04863

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с неправильным контролем доступа, позволяющая нарушителю повысить свои привилегии до уровня администратора домена и оказать воздействие на конфиденциальность целостность и доступость защищаемой информации

CVSS3: 9.1
0%
Низкий
4 месяца назад

Уязвимостей на страницу