CVE-2024-26458
CVE-2024-26458 is a memory leak vulnerability found in Kerberos 5 (krb5) version 1.21.2, specifically within the /krb5/src/lib/rpc/pmap_rmt.c
file. This vulnerability can lead to resource exhaustion and potentially impact system stability. While the CVSS score is 0, indicating a low base severity, the SOCRadar Vulnerability Risk Score (SVRS) is 30 and it's tagged as "In The Wild". This suggests that although the CVSS score is low, it needs to be monitored closely. Continuous memory leaks can degrade performance over time. Kerberos is a widely used authentication protocol, so this flaw could affect numerous systems. Organizations should monitor this CVE for potential exploitation attempts and consider patching when available.
Description
CVE-2024-26458 affects Kerberos 5 (krb5) version 1.21.2, specifically within the /krb5/src/lib/rpc/pmap_rmt.c component. The vulnerability manifests as a memory leak, potentially leading to resource depletion and system instability. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk level.
Key Insights
- Memory Leak: The vulnerability causes a memory leak, which can lead to resource depletion and system instability. This can potentially disrupt critical services relying on Kerberos for authentication.
- Impact on Kerberos: The memory leak is located in the Kerberos 5 authentication system, impacting its functionality and security.
- Active Exploitation: The CVE is tagged "In The Wild," indicating that attackers are actively exploiting this vulnerability.
- No Public Exploits: Despite active exploitation, no publicly available exploits have been identified. This means attackers are likely using custom-developed tools to exploit this vulnerability.
Mitigation Strategies
- Update Kerberos: Patching the affected version of Kerberos to 1.21.3 or later is the most effective way to mitigate this vulnerability.
- Implement Access Controls: Limit access to the vulnerable Kerberos component to only authorized users and applications.
- Monitor System Resources: Closely monitor system resources, particularly memory usage, for signs of resource depletion. This can help identify potential exploitation attempts.
- Security Awareness: Raise awareness among system administrators and users about the vulnerability and the potential risks involved.
Additional Information: If you have further questions regarding this incident, you can utilize the "Ask to Analyst" feature, contact SOCRadar directly, or open a support ticket for additional information.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.