Server-Side Request Forgery Vulnerability in Kdcproxy by Red Hat
CVE-2025-59088

8.6HIGH

What is CVE-2025-59088?

This vulnerability arises when Kdcproxy processes a request for a realm without defined server addresses, leading it to query SRV records in the DNS zone of the realm. A malicious actor can exploit this behavior by crafting specific requests that target a DNS zone where they control SRV records. This could direct queries to arbitrary ports and hostnames, including those that resolve to internal or loopback IP addresses. As a result, attackers can probe the internal network's topology, scan ports, and potentially exfiltrate sensitive data. Deployments where the 'use_dns' setting is disabled are immune to this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

kdcproxy 0 < 1.1.0

Red Hat Enterprise Linux 10 0:1.0.0-19.el10_1

Red Hat Enterprise Linux 10.0 Extended Update Support 0:1.0.0-19.el10_0

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.