Products
Keycloak
Source
secalert@redhat.com
Tags
CVE-2024-4629 details
Published : Sept. 3, 2024, 8:15 p.m.
Last Modified : Sept. 3, 2024, 8:15 p.m.
Last Modified : Sept. 3, 2024, 8:15 p.m.
Description
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.5 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-837 | Improper Enforcement of a Single, Unique Action | The product requires that an actor should only be able to perform an action once, or to have only one unique action, but the product does not enforce or improperly enforces this restriction. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
Base Score
6.5
Exploitability Score
3.9
Impact Score
2.5
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
References
URL | Source |
---|---|
https://access.redhat.com/security/cve/CVE-2024-4629 | secalert@redhat.com |
https://bugzilla.redhat.com/show_bug.cgi?id=2276761 | secalert@redhat.com |
This website uses the NVD API, but is not approved or certified by it.