CVE-2025-4404

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-4404
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-4404.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-4404
Downstream
Related
Published
2025-06-17T14:15:32Z
Modified
2025-07-02T04:51:55.652474Z
Summary
[none]
Details

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the krbCanonicalName for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

References

Affected packages

Debian:12 / freeipa

Package

Name
freeipa
Purl
pkg:deb/debian/freeipa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.11-1
4.9.11-1+exp1
4.9.11-2
4.10.1-1+exp1
4.10.1+dfsg1-1+exp1
4.10.2-1
4.10.2-2
4.10.2-2+exp1
4.11.1-1
4.11.1-1+exp1
4.11.1-2
4.11.1-2+exp1
4.11.1-2.1
4.12.2-1
4.12.2-2
4.12.2-3
4.12.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / freeipa

Package

Name
freeipa
Purl
pkg:deb/debian/freeipa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.4-1

Affected versions

4.*

4.9.11-1
4.9.11-1+exp1
4.9.11-2
4.10.1-1+exp1
4.10.1+dfsg1-1+exp1
4.10.2-1
4.10.2-2
4.10.2-2+exp1
4.11.1-1
4.11.1-1+exp1
4.11.1-2
4.11.1-2+exp1
4.11.1-2.1
4.12.2-1
4.12.2-2
4.12.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}