First published: Thu Mar 21 2024(Updated: )
A low-privileged user can obtain a hash of the passwords of all domain users and perform offline brute force (kerberoasting). It was found that all users who have TGT Kerberos tickets can request TGS for another user's principal. And since the “krbPrincipalKey” value for users is created based on their password, kerberoasting attacks on TGS tickets are possible. A potential attacker can brute force the password by requesting TGS for other users.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeIPA | <4.11.2 | 4.11.2 |
redhat/FreeIPA | <4.12.1 | 4.12.1 |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise linux aus | =8.2 | |
redhat enterprise linux aus | =8.4 | |
redhat enterprise linux aus | =8.6 | |
redhat enterprise Linux eus | =8.8 | |
redhat enterprise linux tus | =8.4 | |
redhat enterprise linux tus | =8.6 | |
Red Hat Enterprise Linux for SAP Solutions | =8.4 | |
Red Hat Enterprise Linux for SAP Solutions | =8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3183 is considered a low severity vulnerability.
To fix CVE-2024-3183, you should upgrade to FreeIPA version 4.11.2 or 4.12.1 or ensure your Red Hat Enterprise Linux is updated to the latest supported version.
CVE-2024-3183 affects all users within a domain who have TGT Kerberos tickets.
CVE-2024-3183 allows low-privileged users to obtain password hashes of all domain users, potentially enabling offline brute force attacks.
There is no official workaround for CVE-2024-3183, so it is recommended to apply the necessary updates.