Metrics
Affected Vendors & Products
Thu, 20 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Eus Long Life
|
|
| CPEs | cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/a:redhat:rhel_aus:8.4::appstream cpe:/a:redhat:rhel_eus_long_life:8.4::appstream |
|
| Vendors & Products |
Redhat rhel Eus Long Life
|
|
| References |
|
Thu, 20 Nov 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_e4s:8.8::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/a:redhat:rhel_tus:8.8::appstream |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel Tus |
|
| References |
|
Thu, 20 Nov 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0::appstream | |
| References |
|
Wed, 19 Nov 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream | |
| References |
|
Mon, 17 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel E4s
|
|
| CPEs | cpe:/a:redhat:rhel_e4s:9.2::appstream | |
| Vendors & Products |
Redhat rhel E4s
|
|
| References |
|
Thu, 13 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.6 |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 12 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux Eus
Redhat rhel Eus |
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:rhel_eus:9.6::appstream cpe:/o:redhat:enterprise_linux:10.1 cpe:/o:redhat:enterprise_linux_eus:10.0 |
| Vendors & Products |
Redhat enterprise Linux Eus
Redhat rhel Eus |
|
| References |
|
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected. | |
| Title | Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-11-12T16:35:27.877Z
Updated: 2025-11-20T08:56:05.899Z
Reserved: 2025-09-08T21:43:30.845Z
Link: CVE-2025-59088
Updated: 2025-11-12T20:48:13.141Z
Status : Awaiting Analysis
Published: 2025-11-12T17:15:38.153
Modified: 2025-11-20T15:17:37.227
Link: CVE-2025-59088