Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-4404

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-17 Jun, 2025 | 13:39
Updated At-29 Jul, 2025 | 17:59
Rejected At-
Credits

Freeipa: idm: privilege escalation from host to domain admin in freeipa

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:17 Jun, 2025 | 13:39
Updated At:29 Jul, 2025 | 17:59
Rejected At:
▼CVE Numbering Authority (CNA)
Freeipa: idm: privilege escalation from host to domain admin in freeipa

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

Affected Products
Collection URL
https://www.freeipa.org/
Package Name
freeipa
Default Status
unaffected
Versions
Affected
  • From 0 before 4.12.4 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 10
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/o:redhat:enterprise_linux:10.0
Default Status
affected
Versions
Unaffected
  • From 0:4.12.2-15.el10_0.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7 Extended Lifecycle Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/o:redhat:rhel_els:7
Default Status
affected
Versions
Unaffected
  • From 0:4.6.8-5.el7_9.18 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 8100020250603150652.143e9e98 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 8100020250603134209.823393f5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Advanced Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 8020020250609031831.50ea30f9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Advanced Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 8020020250609030144.792f4060 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020250609101903.f153676a before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020250609095221.5b01ab7e before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060927.c1533a64 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060504.ada582f1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060927.c1533a64 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060504.ada582f1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060927.c1533a64 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020250606060504.ada582f1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
  • cpe:/a:redhat:rhel_tus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020250604195510.e581a9e4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
  • cpe:/a:redhat:rhel_tus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020250604202433.b0a6ceea before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:client
CPEs
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
  • cpe:/a:redhat:rhel_tus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020250604195510.e581a9e4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
idm:DL1
CPEs
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
  • cpe:/a:redhat:rhel_tus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020250604202433.b0a6ceea before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
  • cpe:/a:redhat:enterprise_linux:9::crb
Default Status
affected
Versions
Unaffected
  • From 0:4.12.2-14.el9_6.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/a:redhat:rhel_e4s:9.0::appstream
Default Status
affected
Versions
Unaffected
  • From 0:4.9.8-11.el9_0.4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/a:redhat:rhel_e4s:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:4.10.1-12.el9_2.4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.4 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/a:redhat:rhel_eus:9.4::appstream
  • cpe:/a:redhat:rhel_eus:9.4::crb
Default Status
affected
Versions
Unaffected
  • From 0:4.11.0-15.el9_4.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
ipa
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unknown
Problem Types
TypeCWE IDDescription
CWECWE-1220Insufficient Granularity of Access Control
Type: CWE
CWE ID: CWE-1220
Description: Insufficient Granularity of Access Control
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Red Hat severity rating
value:
Important
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Exploits

Credits

Red Hat would like to thank Mikhail Sukhov (Positive Technologies) for reporting this issue.
Timeline
EventDate
Reported to Red Hat.2025-05-06 22:17:13
Made public.2025-06-17 00:00:00
Event: Reported to Red Hat.
Date: 2025-05-06 22:17:13
Event: Made public.
Date: 2025-06-17 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:9184
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9185
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9186
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9187
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9188
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9189
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9190
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9191
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9192
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9193
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9194
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2025-4404
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2364606
issue-tracking
x_refsource_REDHAT
https://pagure.io/freeipa/c/6b9400c135ed16b10057b350cc9ce42aa0e862d4
N/A
https://pagure.io/freeipa/c/796ed20092d554ee0c9e23295e346ec1e8a0bf6e
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9184
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9185
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9186
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9187
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9188
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9189
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9190
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9191
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9192
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9193
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9194
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-4404
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2364606
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://pagure.io/freeipa/c/6b9400c135ed16b10057b350cc9ce42aa0e862d4
Resource: N/A
Hyperlink: https://pagure.io/freeipa/c/796ed20092d554ee0c9e23295e346ec1e8a0bf6e
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:17 Jun, 2025 | 14:15
Updated At:29 Jul, 2025 | 18:15

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1220Secondarysecalert@redhat.com
CWE ID: CWE-1220
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:9184secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9185secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9186secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9187secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9188secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9189secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9190secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9191secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9192secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9193secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9194secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2025-4404secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2364606secalert@redhat.com
N/A
https://pagure.io/freeipa/c/6b9400c135ed16b10057b350cc9ce42aa0e862d4secalert@redhat.com
N/A
https://pagure.io/freeipa/c/796ed20092d554ee0c9e23295e346ec1e8a0bf6esecalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9184
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9185
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9186
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9187
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9188
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9189
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9190
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9191
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9192
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9193
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9194
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-4404
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2364606
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://pagure.io/freeipa/c/6b9400c135ed16b10057b350cc9ce42aa0e862d4
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://pagure.io/freeipa/c/796ed20092d554ee0c9e23295e346ec1e8a0bf6e
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2024-7387
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.69% / 70.86%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 23:58
Updated-27 Aug, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openshift/builder: path traversal allows command injection in privileged buildcontainer using docker build strategy

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4.14Red Hat OpenShift Container Platform 4.17Red Hat OpenShift Container Platform 4.12Red Hat OpenShift Container Platform 4.13Red Hat OpenShift Container Platform 4.15Red Hat OpenShift Container Platform 4.16
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2023-0462
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8||HIGH
EPSS-0.08% / 23.98%
||
7 Day CHG~0.00%
Published-20 Sep, 2023 | 13:40
Updated-24 Sep, 2024 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary code execution through yaml global parameters

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

Action-Not Available
Vendor-n/aRed Hat, Inc.The Foreman
Product-satelliteforemanRed Hat Satellite 6foreman
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-0118
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.03% / 8.46%
||
7 Day CHG~0.00%
Published-20 Sep, 2023 | 13:39
Updated-17 Sep, 2024 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Foreman: arbitrary code execution through templates

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

Action-Not Available
Vendor-Red Hat, Inc.The Foreman
Product-satelliteforemanenterprise_linuxRed Hat Satellite 6.11 for RHEL 7Red Hat Satellite 6.14 for RHEL 8Red Hat Satellite 6.13 for RHEL 8Red Hat Satellite 6.11 for RHEL 8Red Hat Satellite 6.12 for RHEL 8
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-3874
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8||HIGH
EPSS-0.17% / 38.84%
||
7 Day CHG~0.00%
Published-22 Sep, 2023 | 13:56
Updated-24 Sep, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Os command injection via ct_command and fcct_command

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

Action-Not Available
Vendor-n/aRed Hat, Inc.The Foreman
Product-satelliteforemanRed Hat Satellite 6foreman
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6725
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 10.44%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 12:38
Updated-30 Jul, 2025 | 20:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tripleo-ansible: bind keys are world readable

An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openstack_platformRed Hat OpenStack Platform 17.1Red Hat OpenStack Platform 17.1 for RHEL 9Red Hat OpenStack Platform 18.0Red Hat OpenStack Platform 17.1 for RHEL 8Red Hat OpenStack Platform 16.1Red Hat OpenStack Platform 16.2
CWE ID-CWE-1220
Insufficient Granularity of Access Control
CVE-2023-4456
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.07% / 20.36%
||
7 Day CHG~0.00%
Published-21 Aug, 2023 | 15:19
Updated-23 Nov, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openshift-logging: lokistack authorisation is cached too broadly

A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_loggingRHOL-5.5-RHEL-8RHOL-5.6-RHEL-8RHOL-5.7-RHEL-8
CWE ID-CWE-1220
Insufficient Granularity of Access Control
CVE-2023-39418
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.1||LOW
EPSS-0.40% / 60.10%
||
7 Day CHG-0.03%
Published-11 Aug, 2023 | 12:19
Updated-06 Aug, 2025 | 11:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Postgresql: merge fails to enforce update or select row security policies

A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.

Action-Not Available
Vendor-Debian GNU/LinuxThe PostgreSQL Global Development GroupRed Hat, Inc.
Product-debian_linuxpostgresqlenterprise_linuxRed Hat Software CollectionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 6
CWE ID-CWE-1220
Insufficient Granularity of Access Control
Details not found