Privilege Context Switching Error Affecting sssd package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SSSD-13542360
  • published14 Oct 2025
  • disclosed9 Oct 2025
  • creditgatariee

Introduced: 9 Oct 2025

NewCVE-2025-11561  (opens in a new tab)
CWE-270  (opens in a new tab)

How to fix?

There is no fixed version for sssd.

Overview

Affected versions of this package are vulnerable to Privilege Context Switching Error via improper mapping of domain user accounts to privileged local accounts when the Kerberos local authentication plugin sssd_krb5_localauth_plugin is not enabled. An attacker can gain unauthorized access or elevated privileges by modifying certain Active Directory attributes, such as userPrincipalName or samAccountName, to impersonate privileged users. This is only exploitable if the Kerberos local authentication plugin is not enabled in the configuration.

Workaround

This vulnerability can be mitigated by explicitly enabling the SSSD Kerberos local authentication plugin (sssd_krb5_localauth_plugin) and disabling an2ln plugin with disable = an2ln .

CVSS Base Scores

version 4.0
version 3.1