Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
There's no available mitigation other than updating to the package version.
Tue, 30 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream cpe:/a:redhat:rhel_eus:9.4::crb |
|
Vendors & Products |
Redhat rhel Eus
|
|
References |
|
Tue, 30 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
References |
|
Tue, 30 Sep 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel E4s
|
|
CPEs | cpe:/a:redhat:rhel_e4s:9.0::appstream | |
Vendors & Products |
Redhat rhel E4s
|
|
References |
|
Tue, 30 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration. | |
Title | Freeipa: idm: privilege escalation from host to domain admin in freeipa | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-1220 | |
CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-30T17:01:36.196Z
Reserved: 2025-07-11T14:20:32.459Z
Link: CVE-2025-7493

Updated: 2025-09-30T16:03:30.437Z

Status : Received
Published: 2025-09-30T15:15:58.243
Modified: 2025-09-30T17:15:41.637
Link: CVE-2025-7493

No data.

No data.