Severity
6.1MEDIUMNVD
EPSS
0.8%
top 26.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 19
Latest updateMay 13

Description

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.

CVSS vector

AV:N/AC:H/C:P/I:P/A:CExploitability: 3.9 | Impact: 8.5

Affected Packages2 packages

Debianmit/krb5< 1.12.1+dfsg-17+3
NVDmit/kerberos_510 versions+9

🔴Vulnerability Details

3
GHSA
GHSA-8qhp-h7xw-f46m: The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc2022-05-13
CVEList
CVE-2014-9422: The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc2015-02-19
OSV
CVE-2014-9422: The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc2015-02-19

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2015-02-10
Red Hat
krb5: kadmind incorrectly validates server principal name (MITKRB5-SA-2015-001)2015-02-03
Debian
CVE-2014-9422: krb5 - The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT...2014

💬Community

2
Bugzilla
CVE-2014-5352 CVE-2014-9421 CVE-2014-9423 CVE-2014-9422 krb5: various flaws [fedora-all]2015-02-03
Bugzilla
CVE-2014-9422 krb5: kadmind incorrectly validates server principal name (MITKRB5-SA-2015-001)2015-01-07
CVE-2014-9422 — Improper Access Control in Kerberos 5 | cvebase