CVE-2024-4629
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/09/2024
Last modified:
16/09/2024
Description
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 24.0.3 (excluding) | |
| cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:*:*:*:* | 22.0 (including) | 22.012 (excluding) |
| cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:* | 7.6 (including) | 7.6.10 (excluding) |
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:6493
- https://access.redhat.com/errata/RHSA-2024:6494
- https://access.redhat.com/errata/RHSA-2024:6495
- https://access.redhat.com/errata/RHSA-2024:6497
- https://access.redhat.com/errata/RHSA-2024:6499
- https://access.redhat.com/errata/RHSA-2024:6500
- https://access.redhat.com/errata/RHSA-2024:6501
- https://access.redhat.com/security/cve/CVE-2024-4629
- https://bugzilla.redhat.com/show_bug.cgi?id=2276761



