Permalink
CVE-2025-3576
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Krb5: kerberos rc4-hmac-md5 checksum vulnerability enabling message spoofing via md5 collisions
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
References
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13664 vendor-advisory x_refsource_REDHAT
- RHSA-2025:13777 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15000 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15001 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15002 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15003 vendor-advisory x_refsource_REDHAT
- RHSA-2025:15004 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8411 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9418 vendor-advisory x_refsource_REDHAT
- RHSA-2025:9430 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
Affected products
krb5
- *
- <1.22
rhcos
discovery/discovery-server-rhel9
- *
aap-cloud-metrics-collector-container
ansible-automation-platform-24/ee-minimal-rhel9
ansible-automation-platform-25/ee-minimal-rhel8
ansible-automation-platform-24/ee-supported-rhel8
ansible-automation-platform-24/ee-supported-rhel9
registry.redhat.io/discovery/discovery-server-rhel9
- *
ansible-automation-platform-24/ansible-builder-rhel9
ansible-automation-platform-25/ansible-builder-rhel8
ansible-automation-platform-24/platform-resource-runner-rhel8
ansible-automation-platform-25/platform-resource-runner-rhel8
Matching in nixpkgs
pkgs.pam_krb5
PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC
-
nixos-unstable -
- nixpkgs-unstable krb5-4.11
pkgs.python312Packages.krb5
Kerberos API bindings for Python
-
nixos-unstable -
- nixpkgs-unstable krb5-0.7.1
pkgs.python313Packages.krb5
Kerberos API bindings for Python
-
nixos-unstable -
- nixpkgs-unstable krb5-0.7.1
Package maintainers
-
@de11n Elliot Cameron <nixpkgs-commits@deshaw.com>
-
@invokes-su Souvik Sen <nixpkgs-commits@deshaw.com>
-
@despsyched Priyanshu Tripathi <priyanshu.tripathi@deshaw.com>