๐Ÿ” CVE Alert

CVE-2024-2698

HIGH 8.8

Freeipa: delegation rules allow a proxy service to impersonate any user to access another target service

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.

CWE CWE-863
Published Jun 12, 2024
Last Updated Nov 20, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3754 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3755 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3757 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3759 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-2698 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2270353 freeipa.org: https://www.freeipa.org/release-notes/4-12-1.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/