The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate.
2013-01-27T18:55:02.070
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.9 (HIGH)
AV:A/AC:M/Au:N/C:C/I:C/A:C
5.5
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | redhat | freeipa | 2.0.0 | Yes |
| Application | redhat | freeipa | 2.0.1 | Yes |
| Application | redhat | freeipa | 2.1.0 | Yes |
| Application | redhat | freeipa | 2.1.1 | Yes |
| Application | redhat | freeipa | 2.1.3 | Yes |
| Application | redhat | freeipa | 2.1.4 | Yes |
| Application | redhat | freeipa | 2.2.1 | Yes |
| Application | redhat | freeipa | 3.0.0 | Yes |
| Application | redhat | freeipa | 3.0.1 | Yes |
| Application | redhat | freeipa | 3.0.2 | Yes |
| Application | redhat | freeipa | 3.1.1 | Yes |