CVE-2025-4404
CRITICALFreeIPA - Privilege Escalation
Title source: llmDescription
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Exploits (1)
References (16)
Scores
CVSS v3
9.1
EPSS
0.0029
EPSS Percentile
52.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-1220
Status
published
Products (23)
Red Hat/Red Hat Enterprise Linux 10
0:4.12.2-15.el10_0.1
Red Hat/Red Hat Enterprise Linux 6
Red Hat/Red Hat Enterprise Linux 7 Extended Lifecycle Support
0:4.6.8-5.el7_9.18
Red Hat/Red Hat Enterprise Linux 8
8100020250603134209.823393f5
Red Hat/Red Hat Enterprise Linux 8
8100020250603150652.143e9e98
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support
8020020250609030144.792f4060
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support
8020020250609031831.50ea30f9
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
8040020250609095221.5b01ab7e
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
8040020250609101903.f153676a
Red Hat/Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
8060020250606060504.ada582f1
... and 13 more
Published
Jun 17, 2025
Tracked Since
Feb 18, 2026