First published: Mon Apr 14 2025(Updated: )
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3576 has a severity rating that indicates a significant security risk due to its potential for message spoofing.
To fix CVE-2025-3576, update your MIT Kerberos implementation to a version that disables or mitigates the use of RC4-HMAC-MD5.
CVE-2025-3576 affects users of the MIT Kerberos implementation that allows the use of GSSAPI with RC4-HMAC-MD5.
CVE-2025-3576 can be exploited through MITD messages, where an attacker can use MD5 collisions to spoof integrity protections.
A temporary workaround for CVE-2025-3576 includes configuring the system to prefer stronger encryption methods over RC4.