CVE-2025-54882
BaseFortify
Publication date: 2025-08-07
Last updated on: 2025-10-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| himmelblau-idm | himmelblau | From 0.8.0 (inc) to 0.9.22 (exc) |
| himmelblau-idm | himmelblau | From 1.0.0 (inc) to 1.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Himmelblau, an interoperability suite for Microsoft Azure Entra ID and Intune, involves the storage of the cloud Ticket Granting Ticket (TGT) in the Kerberos credential cache as world readable. Specifically, in versions 0.8.0 through 0.9.21 and 1.0.0-beta through 1.1.0, the credential cache and the credentials it contains are accessible by any user, which can lead to unauthorized access to sensitive authentication tokens.
How can this vulnerability impact me? :
Because the Kerberos credential cache and stored credentials are world readable, unauthorized users could potentially access sensitive authentication tokens (cloud TGTs). This could allow attackers to impersonate legitimate users, gain unauthorized access to systems or data, and compromise the security of your environment.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, remove all read access to Himmelblau Kerberos credential caches for all users except for the owners. Additionally, upgrade Himmelblau to version 0.9.22 or later, or 1.2.0 or later, where this issue is fixed.