Critical severity9.1NVD Advisory· Published Jun 17, 2025· Updated Apr 15, 2026
CVE-2025-4404
CVE-2025-4404
Description
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the krbCanonicalName for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- www.openwall.com/lists/oss-security/2025/09/30/6nvd
- access.redhat.com/errata/RHSA-2025:9184nvd
- access.redhat.com/errata/RHSA-2025:9185nvd
- access.redhat.com/errata/RHSA-2025:9186nvd
- access.redhat.com/errata/RHSA-2025:9187nvd
- access.redhat.com/errata/RHSA-2025:9188nvd
- access.redhat.com/errata/RHSA-2025:9189nvd
- access.redhat.com/errata/RHSA-2025:9190nvd
- access.redhat.com/errata/RHSA-2025:9191nvd
- access.redhat.com/errata/RHSA-2025:9192nvd
- access.redhat.com/errata/RHSA-2025:9193nvd
- access.redhat.com/errata/RHSA-2025:9194nvd
- access.redhat.com/security/cve/CVE-2025-4404nvd
- bugzilla.redhat.com/show_bug.cginvd
- pagure.io/freeipa/c/6b9400c135ed16b10057b350cc9ce42aa0e862d4nvd
- pagure.io/freeipa/c/796ed20092d554ee0c9e23295e346ec1e8a0bf6envd
News mentions
0No linked articles in our index yet.