CVE-2025-11561
📋 TL;DR
This vulnerability allows attackers with permission to modify Active Directory attributes (like userPrincipalName or samAccountName) to impersonate privileged users on domain-joined Linux systems. The flaw occurs in SSSD's Kerberos local authentication plugin fallback mechanism, potentially leading to unauthorized access or privilege escalation. Affected systems are Linux hosts integrated with Active Directory using SSSD.
💻 Affected Systems
- System Security Services Daemon (SSSD)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete domain compromise through privilege escalation to root on multiple Linux systems, enabling lateral movement across the network.
Likely Case
Unauthorized access to sensitive Linux systems, data exfiltration, and limited privilege escalation within the compromised environment.
If Mitigated
Minimal impact with proper AD attribute modification controls and timely patching, limiting attacker ability to exploit the fallback mechanism.
🎯 Exploit Status
Exploitation requires AD attribute modification privileges and knowledge of target systems. No public exploit code identified in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific Red Hat advisories for version details
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:19610
Restart Required: Yes
Instructions:
1. Update SSSD package using your distribution's package manager. 2. Restart SSSD service. 3. Verify the fix by checking SSSD version and configuration.
🔧 Temporary Workarounds
Disable an2ln plugin fallback
linuxConfigure SSSD to disable the fallback to an2ln plugin in krb5_localauth_plugin settings
Edit /etc/sssd/sssd.conf and set krb5_localauth_plugin = sssd_krb5_localauth_plugin (ensure no fallback)
Restrict AD attribute modifications
allImplement strict access controls on userPrincipalName and samAccountName attributes in Active Directory
🧯 If You Can't Patch
- Implement strict monitoring of AD attribute modifications and alert on suspicious changes
- Segment Linux systems from AD management interfaces and limit AD modification privileges
🔍 How to Verify
Check if Vulnerable:
Check SSSD configuration for krb5_localauth_plugin settings and verify if an2ln fallback is possible
Check Version:
sssd --version
Verify Fix Applied:
Verify SSSD version is updated per vendor advisories and check configuration no longer allows an2ln fallback
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication attempts from modified AD accounts
- SSSD error logs related to localauth plugin fallbacks
Network Indicators:
- Unexpected Kerberos authentication requests from Linux systems
SIEM Query:
source="sssd" AND ("an2ln" OR "localauth_fallback")
🔗 References
- https://access.redhat.com/errata/RHSA-2025:19610
- https://access.redhat.com/errata/RHSA-2025:19847
- https://access.redhat.com/errata/RHSA-2025:19848
- https://access.redhat.com/errata/RHSA-2025:19849
- https://access.redhat.com/errata/RHSA-2025:19850
- https://access.redhat.com/errata/RHSA-2025:19851
- https://access.redhat.com/errata/RHSA-2025:19852
- https://access.redhat.com/errata/RHSA-2025:19853
- https://access.redhat.com/errata/RHSA-2025:19854
- https://access.redhat.com/errata/RHSA-2025:19859
- https://access.redhat.com/errata/RHSA-2025:20954
- https://access.redhat.com/errata/RHSA-2025:21020
- https://access.redhat.com/errata/RHSA-2025:21067
- https://access.redhat.com/errata/RHSA-2025:21329
- https://access.redhat.com/errata/RHSA-2025:21795
- https://access.redhat.com/errata/RHSA-2025:22256
- https://access.redhat.com/errata/RHSA-2025:22265
- https://access.redhat.com/errata/RHSA-2025:22277
- https://access.redhat.com/errata/RHSA-2025:22529
- https://access.redhat.com/errata/RHSA-2025:22548
- https://access.redhat.com/errata/RHSA-2025:22724
- https://access.redhat.com/errata/RHSA-2025:23113
- https://access.redhat.com/errata/RHSA-2026:0316
- https://access.redhat.com/errata/RHSA-2026:0677
- https://access.redhat.com/security/cve/CVE-2025-11561
- https://blog.async.sg/kerberos-ldr
- https://bugzilla.redhat.com/show_bug.cgi?id=2402727