Description
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password.

If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
Published: 2024-06-12
Score: 8.1 High
EPSS: 21.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

To mitigate this vulnerability, ticket requests to user principals are now disallowed in FreeIPA realms by default. This will keep attackers from obtaining data encrypted with the user key directly.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.05751}

epss

{'score': 0.06621}


Sat, 05 Jul 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 05 Jul 2025 03:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Wed, 25 Sep 2024 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux Aus
Redhat enterprise Linux Eus
Redhat enterprise Linux Tus
Redhat enterprise Linux Update Services For Sap Solutions
CPEs cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
Vendors & Products Redhat enterprise Linux Aus
Redhat enterprise Linux Eus
Redhat enterprise Linux Tus
Redhat enterprise Linux Update Services For Sap Solutions

Subscriptions

Redhat Enterprise Linux Enterprise Linux Aus Enterprise Linux Eus Enterprise Linux Tus Enterprise Linux Update Services For Sap Solutions Rhel Aus Rhel E4s Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T07:16:16.609Z

Reserved: 2024-04-02T09:48:54.404Z

Link: CVE-2024-3183

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:07.630Z

cve-icon NVD

Status : Modified

Published: 2024-06-12T09:15:18.683

Modified: 2024-11-21T09:29:05.900

Link: CVE-2024-3183

cve-icon Redhat

Severity : Important

Publid Date: 2024-06-10T00:00:00Z

Links: CVE-2024-3183 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses