Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-11561

CVE-2025-11561: SSSD Privilege Escalation Vulnerability

CVE-2025-11561 is a privilege escalation flaw in SSSD affecting Active Directory integration on Linux systems. Attackers can modify AD attributes to impersonate privileged users. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 15, 2026

CVE-2025-11561 Overview

A privilege escalation vulnerability has been identified in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. The flaw resides in the Kerberos local authentication plugin (sssd_krb5_localauth_plugin), which is enabled by default in standard configurations. A dangerous fallback mechanism to the an2ln plugin allows attackers who can modify specific Active Directory attributes to impersonate privileged users on domain-joined Linux hosts.

This vulnerability is particularly concerning for enterprise environments where Linux systems are integrated with Active Directory for centralized authentication. An attacker with even limited Active Directory permissions—specifically the ability to modify userPrincipalName or samAccountName attributes—can leverage this flaw to escalate privileges and gain unauthorized access to sensitive resources.

Critical Impact

Attackers with permission to modify AD attributes can impersonate privileged users, leading to unauthorized access or privilege escalation on domain-joined Linux hosts.

Affected Products

  • Linux systems running SSSD with Active Directory integration
  • Systems using the default sssd_krb5_localauth_plugin configuration
  • Domain-joined Linux hosts with Kerberos authentication enabled

Discovery Timeline

  • October 9, 2025 - CVE-2025-11561 published to NVD
  • March 19, 2026 - Last updated in NVD database

Technical Details for CVE-2025-11561

Vulnerability Analysis

The vulnerability stems from improper privilege management (CWE-269) in the SSSD Kerberos authentication workflow. When SSSD processes Kerberos authentication requests, it relies on the sssd_krb5_localauth_plugin to map Kerberos principals to local user accounts. However, the implementation allows a fallback to the an2ln (authenticated name to local name) plugin when the primary plugin fails to resolve a principal.

This fallback mechanism does not adequately validate the integrity of AD attribute mappings, creating a security gap that can be exploited. The an2ln plugin performs principal-to-local-user translation using AD attributes that may be controllable by lower-privileged users in certain AD configurations.

The vulnerability can be exploited over the network and requires low privileges—specifically, the ability to modify certain AD attributes. No user interaction is required for successful exploitation, and a successful attack can result in complete compromise of confidentiality, integrity, and availability on the affected Linux host.

Root Cause

The root cause is insufficient validation in the SSSD authentication chain when falling back from the sssd_krb5_localauth_plugin to the an2ln plugin. The fallback mechanism trusts AD attribute values (specifically userPrincipalName and samAccountName) without proper verification that the mapping corresponds to the authenticated user's actual identity.

In environments where delegation of attribute modification exists—even for seemingly non-sensitive attributes—attackers can manipulate these values to create mappings that associate their Kerberos principal with privileged local accounts such as root or service accounts.

Attack Vector

The attack leverages network-accessible Active Directory services combined with the SSSD fallback authentication mechanism. An attacker with the ability to modify AD attributes follows this attack pattern:

  1. The attacker identifies a domain-joined Linux host using SSSD for AD authentication
  2. Using their existing AD credentials, the attacker modifies their userPrincipalName or samAccountName attribute to match that of a privileged user
  3. When authenticating to the Linux host, the sssd_krb5_localauth_plugin processes the request but triggers the fallback to an2ln
  4. The an2ln plugin resolves the attacker's manipulated principal to the privileged local account
  5. The attacker gains access with the privileges of the impersonated user

The attack requires network access to the target system and valid AD credentials with attribute modification permissions. For detailed technical analysis of the Kerberos LDR (Local Domain Resolution) mechanisms involved, refer to the Async Blog on Kerberos LDR.

Detection Methods for CVE-2025-11561

Indicators of Compromise

  • Unusual modifications to userPrincipalName or samAccountName attributes in Active Directory logs
  • Authentication events where the authenticated principal does not match expected user-to-host mappings
  • SSSD debug logs showing fallback from sssd_krb5_localauth_plugin to an2ln plugin
  • Privilege escalation attempts following AD attribute changes on domain-joined Linux systems

Detection Strategies

  • Enable and monitor SSSD debug logging to identify authentication plugin fallback events
  • Implement Active Directory auditing for attribute modifications on user objects, particularly userPrincipalName and samAccountName
  • Deploy SentinelOne agents on domain-joined Linux hosts to detect anomalous authentication patterns and privilege escalation attempts
  • Cross-correlate AD attribute change events with subsequent Linux authentication logs for the same user principal

Monitoring Recommendations

  • Configure alerting on AD attribute modifications for sensitive attributes using your SIEM solution
  • Monitor SSSD authentication logs for unexpected plugin fallback behavior using /var/log/sssd/ log files
  • Implement behavioral analysis for user accounts authenticating to systems they do not normally access
  • Track correlation between AD object changes and subsequent privilege escalation indicators on Linux endpoints

How to Mitigate CVE-2025-11561

Immediate Actions Required

  • Apply security patches from Red Hat or your Linux distribution immediately
  • Review SSSD configuration to disable or restrict fallback to the an2ln plugin where possible
  • Audit Active Directory permissions to identify and restrict accounts with unnecessary attribute modification rights
  • Enable enhanced logging on SSSD and AD domain controllers to detect exploitation attempts

Patch Information

Red Hat has released multiple security advisories addressing this vulnerability. Organizations should apply the appropriate patches based on their Red Hat Enterprise Linux version:

  • RHSA-2025:19610
  • RHSA-2025:19847
  • RHSA-2025:19848
  • RHSA-2025:19849
  • RHSA-2025:19850

Additional advisories and updates can be found at the Red Hat CVE Information page for CVE-2025-11561. For upstream issue tracking, see SSSD GitHub Issue #8021.

Workarounds

  • Restrict delegation of AD attribute modification permissions to trusted administrators only
  • Configure SSSD to use explicit principal-to-user mappings rather than relying on automatic resolution
  • Implement network segmentation to limit access to domain-joined Linux hosts from untrusted network segments
  • Consider disabling the an2ln plugin fallback in SSSD configuration if compatibility permits
bash
# SSSD configuration hardening example
# Add to /etc/sssd/sssd.conf under [domain/YOUR_DOMAIN] section

# Increase logging for authentication events
debug_level = 6

# Restrict authentication to specific user groups
access_provider = simple
simple_allow_groups = linux_admins, linux_users

# Review and restart SSSD after changes
sudo systemctl restart sssd

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-269
  • Technical References
  • Red Hat Security Advisory RHSA-2025:19610

  • Red Hat Security Advisory RHSA-2025:19847

  • Red Hat Security Advisory RHSA-2025:19848

  • Red Hat Security Advisory RHSA-2025:19849

  • Red Hat Security Advisory RHSA-2025:19850

  • Red Hat Security Advisory RHSA-2025:19851

  • Red Hat Security Advisory RHSA-2025:19852

  • Red Hat Security Advisory RHSA-2025:19853

  • Red Hat Security Advisory RHSA-2025:19854

  • Red Hat Security Advisory RHSA-2025:19859

  • Red Hat Security Advisory RHSA-2025:20954

  • Red Hat Security Advisory RHSA-2025:21020

  • Red Hat Security Advisory RHSA-2025:21067

  • Red Hat Security Advisory RHSA-2025:21329

  • Red Hat Security Advisory RHSA-2025:21795

  • Red Hat Security Advisory RHSA-2025:22256

  • Red Hat Security Advisory RHSA-2025:22265

  • Red Hat Security Advisory RHSA-2025:22277

  • Red Hat Security Advisory RHSA-2025:22529

  • Red Hat Security Advisory RHSA-2025:22548

  • Red Hat Security Advisory RHSA-2025:22724

  • Red Hat Security Advisory RHSA-2025:23113

  • Red Hat Security Advisory RHSA-2026:0316

  • Red Hat Security Advisory RHSA-2026:0677

  • Red Hat CVE Information CVE-2025-11561

  • Async Blog on Kerberos LDR

  • Red Hat Bugzilla Entry #2402727

  • SSSD GitHub Issue #8021
  • Related CVEs
  • CVE-2026-31429: Linux Kernel Privilege Escalation Bug

  • CVE-2026-31482: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-32282: Linux Root.Chmod Privilege Escalation Flaw

  • CVE-2026-23253: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English