First published: Thu Mar 21 2024(Updated: )
A low-privileged user can obtain a hash of the passwords of all domain users and perform offline brute force (kerberoasting). It was found that all users who have TGT Kerberos tickets can request TGS for another user's principal. And since the “krbPrincipalKey” value for users is created based on their password, kerberoasting attacks on TGS tickets are possible. A potential attacker can brute force the password by requesting TGS for other users.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeIPA | <4.11.2 | 4.11.2 |
redhat/FreeIPA | <4.12.1 | 4.12.1 |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Aus | =8.2 | |
Redhat Enterprise Linux Aus | =8.4 | |
Redhat Enterprise Linux Aus | =8.6 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux Tus | =8.4 | |
Redhat Enterprise Linux Tus | =8.6 | |
Redhat Enterprise Linux Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Update Services For Sap Solutions | =8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.