๐Ÿ” CVE Alert

CVE-2025-11561

HIGH 8.8

Sssd: sssd default kerberos configuration allows privilege escalation on ad-joined linux systems

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.

CWE CWE-269
Published Oct 9, 2025
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.6 Extended Update Support
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.19
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.20
All versions affected
Red Hat / Red Hat Ceph Storage 7
All versions affected
Red Hat / Red Hat Ceph Storage 8
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19610 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19847 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19848 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19849 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19850 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19851 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19852 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19853 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19854 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19859 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20954 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21020 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21067 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21329 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21795 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22256 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22265 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22277 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22529 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22548 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22724 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:23113 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0316 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0677 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-11561 blog.async.sg: https://blog.async.sg/kerberos-ldr bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2402727 github.com: https://github.com/SSSD/sssd/issues/8021

Credits

Red Hat would like to thank Zavier Lee for reporting this issue.