freeipa CVE Vulnerabilities & Metrics

Focus on freeipa vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About freeipa Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with freeipa. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total freeipa CVEs: 17
Earliest CVE date: 19 Nov 2014, 18:59 UTC
Latest CVE date: 12 Jun 2024, 08:15 UTC

Latest CVE reference: CVE-2024-2698

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical freeipa CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.44

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 15
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS freeipa CVEs

These are the five CVEs with the highest CVSS scores for freeipa, sorted by severity first and recency.

All CVEs for freeipa

CVE-2024-2698 freeipa vulnerability CVSS: 0 12 Jun 2024, 08:15 UTC

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.

CVE-2023-5455 freeipa vulnerability CVSS: 0 10 Jan 2024, 13:15 UTC

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.

CVE-2020-1722 freeipa vulnerability CVSS: 5.4 27 Apr 2020, 21:15 UTC

A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.

CVE-2019-14867 freeipa vulnerability CVSS: 6.8 27 Nov 2019, 09:15 UTC

A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.

CVE-2019-10195 freeipa vulnerability CVSS: 4.0 27 Nov 2019, 08:15 UTC

A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.

CVE-2012-5631 freeipa vulnerability CVSS: 6.8 25 Nov 2019, 15:15 UTC

ipa 3.0 does not properly check server identity before sending credential containing cookies

CVE-2019-14826 freeipa vulnerability CVSS: 2.1 17 Sep 2019, 16:15 UTC

A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.

CVE-2017-2590 freeipa vulnerability CVSS: 5.5 27 Jul 2018, 18:29 UTC

A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.

CVE-2016-9575 freeipa vulnerability CVSS: 6.5 13 Mar 2018, 13:29 UTC

Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.

CVE-2017-12169 freeipa vulnerability CVSS: 4.0 10 Jan 2018, 15:29 UTC

It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.

CVE-2017-11191 freeipa vulnerability CVSS: 6.5 28 Sep 2017, 01:29 UTC

FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern

CVE-2015-5284 freeipa vulnerability CVSS: 5.0 21 Sep 2017, 14:29 UTC

ipa-kra-install in FreeIPA before 4.2.2 puts the CA agent certificate and private key in /etc/httpd/alias/kra-agent.pem, which is world readable.

CVE-2015-5179 freeipa vulnerability CVSS: 5.0 20 Sep 2017, 16:29 UTC

FreeIPA might display user data improperly via vectors involving non-printable characters.

CVE-2016-7030 freeipa vulnerability CVSS: 5.0 28 Aug 2017, 15:29 UTC

FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.

CVE-2016-5414 freeipa vulnerability CVSS: 5.0 27 Jun 2017, 20:29 UTC

FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services.

CVE-2016-5404 freeipa vulnerability CVSS: 4.0 07 Sep 2016, 20:59 UTC

The cert_revoke command in FreeIPA does not check for the "revoke certificate" permission, which allows remote authenticated users to revoke arbitrary certificates by leveraging the "retrieve certificate" permission.

CVE-2015-1827 freeipa vulnerability CVSS: 5.0 30 Mar 2015, 14:59 UTC

The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user that belongs to a large number of groups.

CVE-2014-7850 freeipa vulnerability CVSS: 4.3 28 Nov 2014, 15:59 UTC

Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-7828 freeipa vulnerability CVSS: 3.5 19 Nov 2014, 18:59 UTC

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.