Dismissed
Permalink
CVE-2025-11561
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
Sssd: sssd default kerberos configuration allows privilege escalation on ad-joined linux systems
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, SSSD does not enable the Kerberos local authentication plugin (sssd_krb5_localauth_plugin), allowing an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users. This can result in unauthorized access or privilege escalation on domain-joined Linux hosts.
References
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22256 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22265 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22277 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22548 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22256 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22265 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22277 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22548 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22724 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22256 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22265 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22277 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22548 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22724 x_refsource_REDHAT vendor-advisory
- RHSA-2025:23113 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22256 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22265 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22277 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22548 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22724 x_refsource_REDHAT vendor-advisory
- RHSA-2025:23113 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0316 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
- RHSA-2025:19610 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19847 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19848 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19849 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19850 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19851 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19852 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19853 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19854 x_refsource_REDHAT vendor-advisory
- RHSA-2025:19859 x_refsource_REDHAT vendor-advisory
- RHSA-2025:20954 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21020 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21067 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21329 x_refsource_REDHAT vendor-advisory
- RHSA-2025:21795 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22256 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22265 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22277 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22529 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22548 x_refsource_REDHAT vendor-advisory
- RHSA-2025:22724 x_refsource_REDHAT vendor-advisory
- RHSA-2025:23113 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0316 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0677 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11561 x_refsource_REDHAT vdb-entry
- https://blog.async.sg/kerberos-ldr
- RHBZ#2402727 issue-tracking x_refsource_REDHAT
Affected products
sssd
- =<2.11.1
- *
rhcos
- *
rhceph/rhceph-7-rhel9
- *
rhceph/rhceph-8-rhel9
- *
Package maintainers
-
@illustris Harikrishnan R <me@illustris.tech>