CVE Vulnerabilities

CVE-2025-7493

Insufficient Granularity of Access Control

Published: Sep 30, 2025 | Modified: Nov 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
9.1 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrators name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

Weakness

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatipa-0:4.12.2-15.el10_0.4*
Red Hat Enterprise Linux 10RedHatipa-0:4.12.2-24.el10_1.1*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatipa-0:4.6.8-5.el7_9.23*
Red Hat Enterprise Linux 8RedHatidm:client-8100020250919180242.143e9e98*
Red Hat Enterprise Linux 8RedHatidm:DL1-8100020250918211722.823393f5*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatidm:client-8020020250924110056.50ea30f9*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatidm:DL1-8020020250924104944.792f4060*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatidm:client-8040020250923180004.f153676a*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatidm:DL1-8040020250923175408.5b01ab7e*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatidm:client-8040020250923180004.f153676a*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatidm:DL1-8040020250923175408.5b01ab7e*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatidm:client-8060020250916172436.c1533a64*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatidm:DL1-8060020250916174421.ada582f1*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatidm:client-8060020250916172436.c1533a64*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatidm:DL1-8060020250916174421.ada582f1*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatidm:client-8060020250916172436.c1533a64*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatidm:DL1-8060020250916174421.ada582f1*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatidm:client-8080020250918184739.e581a9e4*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatidm:DL1-8080020250918152850.b0a6ceea*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatidm:client-8080020250918184739.e581a9e4*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatidm:DL1-8080020250918152850.b0a6ceea*
Red Hat Enterprise Linux 9RedHatipa-0:4.12.2-14.el9_6.5*
Red Hat Enterprise Linux 9RedHatipa-0:4.12.2-22.el9_7.1*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatipa-0:4.9.8-11.el9_0.5*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatipa-0:4.10.1-12.el9_2.6*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatipa-0:4.11.0-15.el9_4.7*
FreeipaUbuntuplucky*

Extended Description

Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection. A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.

Potential Mitigations

References