Vulnerability Details CVE-2017-7562
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.5%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2017-7562
-
cpe:2.3:a:mit:kerberos_5:1.0
-
cpe:2.3:a:mit:kerberos_5:1.0.3
-
cpe:2.3:a:mit:kerberos_5:1.0.4
-
cpe:2.3:a:mit:kerberos_5:1.0.5
-
cpe:2.3:a:mit:kerberos_5:1.0.6
-
cpe:2.3:a:mit:kerberos_5:1.0.7
-
cpe:2.3:a:mit:kerberos_5:1.1
-
cpe:2.3:a:mit:kerberos_5:1.1.1
-
cpe:2.3:a:mit:kerberos_5:1.10
-
cpe:2.3:a:mit:kerberos_5:1.10.1
-
cpe:2.3:a:mit:kerberos_5:1.10.2
-
cpe:2.3:a:mit:kerberos_5:1.10.3
-
cpe:2.3:a:mit:kerberos_5:1.10.4
-
cpe:2.3:a:mit:kerberos_5:1.10.5
-
cpe:2.3:a:mit:kerberos_5:1.10.6
-
cpe:2.3:a:mit:kerberos_5:1.10.7
-
cpe:2.3:a:mit:kerberos_5:1.11
-
cpe:2.3:a:mit:kerberos_5:1.11.1
-
cpe:2.3:a:mit:kerberos_5:1.11.2
-
cpe:2.3:a:mit:kerberos_5:1.11.3
-
cpe:2.3:a:mit:kerberos_5:1.11.4
-
cpe:2.3:a:mit:kerberos_5:1.11.5
-
cpe:2.3:a:mit:kerberos_5:1.11.6
-
cpe:2.3:a:mit:kerberos_5:1.12
-
cpe:2.3:a:mit:kerberos_5:1.12.1
-
cpe:2.3:a:mit:kerberos_5:1.12.2
-
cpe:2.3:a:mit:kerberos_5:1.12.3
-
cpe:2.3:a:mit:kerberos_5:1.12.4
-
cpe:2.3:a:mit:kerberos_5:1.12.5
-
cpe:2.3:a:mit:kerberos_5:1.13
-
cpe:2.3:a:mit:kerberos_5:1.13.1
-
cpe:2.3:a:mit:kerberos_5:1.13.2
-
cpe:2.3:a:mit:kerberos_5:1.13.3
-
cpe:2.3:a:mit:kerberos_5:1.13.4
-
cpe:2.3:a:mit:kerberos_5:1.13.5
-
cpe:2.3:a:mit:kerberos_5:1.13.6
-
cpe:2.3:a:mit:kerberos_5:1.13.7
-
cpe:2.3:a:mit:kerberos_5:1.14
-
cpe:2.3:a:mit:kerberos_5:1.14.0
-
cpe:2.3:a:mit:kerberos_5:1.14.1
-
cpe:2.3:a:mit:kerberos_5:1.14.2
-
cpe:2.3:a:mit:kerberos_5:1.14.3
-
cpe:2.3:a:mit:kerberos_5:1.14.4
-
cpe:2.3:a:mit:kerberos_5:1.14.5
-
cpe:2.3:a:mit:kerberos_5:1.14.6
-
cpe:2.3:a:mit:kerberos_5:1.15
-
cpe:2.3:a:mit:kerberos_5:1.15.1
-
cpe:2.3:a:mit:kerberos_5:1.15.2
-
cpe:2.3:a:mit:kerberos_5:1.15.3
-
cpe:2.3:a:mit:kerberos_5:1.15.4
-
cpe:2.3:a:mit:kerberos_5:1.15.5
-
cpe:2.3:a:mit:kerberos_5:1.16
-
cpe:2.3:a:mit:kerberos_5:1.2
-
cpe:2.3:a:mit:kerberos_5:1.2.1
-
cpe:2.3:a:mit:kerberos_5:1.2.2
-
cpe:2.3:a:mit:kerberos_5:1.2.3
-
cpe:2.3:a:mit:kerberos_5:1.2.4
-
cpe:2.3:a:mit:kerberos_5:1.2.5
-
cpe:2.3:a:mit:kerberos_5:1.2.6
-
cpe:2.3:a:mit:kerberos_5:1.2.7
-
cpe:2.3:a:mit:kerberos_5:1.2.8
-
cpe:2.3:a:mit:kerberos_5:1.3
-
cpe:2.3:a:mit:kerberos_5:1.3.1
-
cpe:2.3:a:mit:kerberos_5:1.3.2
-
cpe:2.3:a:mit:kerberos_5:1.3.3
-
cpe:2.3:a:mit:kerberos_5:1.3.4
-
cpe:2.3:a:mit:kerberos_5:1.3.5
-
cpe:2.3:a:mit:kerberos_5:1.3.6
-
cpe:2.3:a:mit:kerberos_5:1.4
-
cpe:2.3:a:mit:kerberos_5:1.4.1
-
cpe:2.3:a:mit:kerberos_5:1.4.2
-
cpe:2.3:a:mit:kerberos_5:1.4.3
-
cpe:2.3:a:mit:kerberos_5:1.4.4
-
cpe:2.3:a:mit:kerberos_5:1.5
-
cpe:2.3:a:mit:kerberos_5:1.5.1
-
cpe:2.3:a:mit:kerberos_5:1.5.2
-
cpe:2.3:a:mit:kerberos_5:1.5.3
-
cpe:2.3:a:mit:kerberos_5:1.5.4
-
cpe:2.3:a:mit:kerberos_5:1.6
-
cpe:2.3:a:mit:kerberos_5:1.6.1
-
cpe:2.3:a:mit:kerberos_5:1.6.2
-
cpe:2.3:a:mit:kerberos_5:1.6.3
-
cpe:2.3:a:mit:kerberos_5:1.7
-
cpe:2.3:a:mit:kerberos_5:1.7.1
-
cpe:2.3:a:mit:kerberos_5:1.7.2
-
cpe:2.3:a:mit:kerberos_5:1.8
-
cpe:2.3:a:mit:kerberos_5:1.8.1
-
cpe:2.3:a:mit:kerberos_5:1.8.2
-
cpe:2.3:a:mit:kerberos_5:1.8.3
-
cpe:2.3:a:mit:kerberos_5:1.8.4
-
cpe:2.3:a:mit:kerberos_5:1.8.5
-
cpe:2.3:a:mit:kerberos_5:1.8.6
-
cpe:2.3:a:mit:kerberos_5:1.9
-
cpe:2.3:a:mit:kerberos_5:1.9.1
-
cpe:2.3:a:mit:kerberos_5:1.9.2
-
cpe:2.3:a:mit:kerberos_5:1.9.3
-
cpe:2.3:a:mit:kerberos_5:1.9.4
-
cpe:2.3:a:mit:kerberos_5:1.9.5
-
cpe:2.3:o:redhat:enterprise_linux:7.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0