vulnerability
Amazon Linux AMI 2: CVE-2025-4404: Security patch for ipa (ALAS-2025-2901)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:N) | Jun 17, 2025 | Jun 25, 2025 | Jun 25, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:N)
Published
Jun 17, 2025
Added
Jun 25, 2025
Modified
Jun 25, 2025
Description
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Solutions
amazon-linux-ami-2-upgrade-ipa-clientamazon-linux-ami-2-upgrade-ipa-client-commonamazon-linux-ami-2-upgrade-ipa-commonamazon-linux-ami-2-upgrade-ipa-debuginfoamazon-linux-ami-2-upgrade-ipa-python-compatamazon-linux-ami-2-upgrade-ipa-serveramazon-linux-ami-2-upgrade-ipa-server-commonamazon-linux-ami-2-upgrade-ipa-server-dnsamazon-linux-ami-2-upgrade-ipa-server-trust-adamazon-linux-ami-2-upgrade-python2-ipaclientamazon-linux-ami-2-upgrade-python2-ipalibamazon-linux-ami-2-upgrade-python2-ipaserver
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.