Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-4404 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Red Hat FreeIPA fails to verify the uniqueness of `krbCanonicalName`. πŸ“‰ **Consequences**: Attackers can steal REALM admin credentials and execute unauthorized management tasks.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-1220. The core flaw is the **lack of validation** for the uniqueness of the `krbCanonicalName` attribute.…

Q3Who is affected? (Versions/Components)

🏒 **Affected**: Red Hat FreeIPA. Specifically, versions prior to the fix in RHSA-2025 advisories. The POC mentions **FreeIPA 4.12.4** as a vulnerable baseline where admin accounts lack proper `krbCanonicalName` values.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With valid credentials, hackers can: 1️⃣ Obtain REALM administrator credentials. 2️⃣ Perform sensitive management tasks.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Exploitation Threshold**: **Medium-High**. Requires **PR:H** (High Privileges) initially. You need a valid domain computer account (e.g., `host/pc1.test.local`) to initiate the attack.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. POCs are available on GitHub (e.g., `Cyxow/CVE-2025-4404-POC`). The attack involves using `kinit` with a host keytab and modifying LDAP entries to inject malicious `krbCanonicalName` values.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1️⃣ Check if your FreeIPA version is < the patched version. 2️⃣ Audit LDAP entries for missing or duplicate `krbCanonicalName` on admin accounts.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. Red Hat released security advisories: **RHSA-2025:9190**, **RHSA-2025:9184**, **RHSA-2025:9191**, and **RHSA-2025:9189**. Update immediately via Red Hat Network.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1️⃣ Restrict LDAP write permissions for host accounts. 2️⃣ Ensure all admin accounts have unique, verified `krbCanonicalName` attributes. 3️⃣ Implement strict Kerberos ticket monitoring and alerting.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. CVSS Score is **High** (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). While it requires initial privileges, the impact is total compromise of the identity infrastructure. Patch ASAP!