CVE-2025-54882
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-07

Last updated on: 2025-10-09

Assigner: GitHub, Inc.

Description
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. In versions 0.8.0 through 0.9.21 and 1.0.0-beta through 1.1.0, Himmelblau stores the cloud TGT received during logon in the Kerberos credential cache. The created credential cache collection and received credentials are stored as world readable. This is fixed in versions 0.9.22 and 1.2.0. To work around this issue, remove all read access to Himmelblau caches for all users except for owners.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-07
Last Modified
2025-10-09
Generated
2026-05-06
AI Q&A
2025-08-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
himmelblau-idm himmelblau From 0.8.0 (inc) to 0.9.22 (exc)
himmelblau-idm himmelblau From 1.0.0 (inc) to 1.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Himmelblau, an interoperability suite for Microsoft Azure Entra ID and Intune, involves the storage of the cloud Ticket Granting Ticket (TGT) in the Kerberos credential cache as world readable. Specifically, in versions 0.8.0 through 0.9.21 and 1.0.0-beta through 1.1.0, the credential cache and the credentials it contains are accessible by any user, which can lead to unauthorized access to sensitive authentication tokens.


How can this vulnerability impact me? :

Because the Kerberos credential cache and stored credentials are world readable, unauthorized users could potentially access sensitive authentication tokens (cloud TGTs). This could allow attackers to impersonate legitimate users, gain unauthorized access to systems or data, and compromise the security of your environment.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, remove all read access to Himmelblau Kerberos credential caches for all users except for the owners. Additionally, upgrade Himmelblau to version 0.9.22 or later, or 1.2.0 or later, where this issue is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart