Server-Side Request Forgery Vulnerability in Kdcproxy by Red Hat
CVE-2025-59088

8.6HIGH

What is CVE-2025-59088?

This vulnerability arises when Kdcproxy processes a request for a realm without defined server addresses, leading it to query SRV records in the DNS zone of the realm. A malicious actor can exploit this behavior by crafting specific requests that target a DNS zone where they control SRV records. This could direct queries to arbitrary ports and hostnames, including those that resolve to internal or loopback IP addresses. As a result, attackers can probe the internal network's topology, scan ports, and potentially exfiltrate sensitive data. Deployments where the 'use_dns' setting is disabled are immune to this vulnerability.

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59088 : Server-Side Request Forgery Vulnerability in Kdcproxy by Red Hat