A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 15 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Apr 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering. | |
Title | Krb5: kerberos rc4-hmac-md5 checksum vulnerability enabling message spoofing via md5 collisions | |
First Time appeared |
Redhat
Redhat ansible Automation Platform Redhat enterprise Linux Redhat openshift |
|
Weaknesses | CWE-328 | |
CPEs | cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat ansible Automation Platform Redhat enterprise Linux Redhat openshift |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-04-15T05:55:26.732Z
Updated: 2025-04-17T08:19:55.773Z
Reserved: 2025-04-14T09:53:43.906Z
Link: CVE-2025-3576

Updated: 2025-04-15T13:11:58.655Z

Status : Awaiting Analysis
Published: 2025-04-15T06:15:44.047
Modified: 2025-04-15T18:39:27.967
Link: CVE-2025-3576
