First published: Mon Mar 01 2021(Updated: )
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | =12.0.0 | |
Redhat Single Sign-on | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20262 is a vulnerability in Keycloak 12.0.0 that allows an attacker to take over an account if they can obtain temporary physical access to a user's browser.
The severity of CVE-2021-20262 is medium with a CVSS score of 6.8.
Keycloak 12.0.0 and Single Sign-on 7.0 are affected by CVE-2021-20262.
To mitigate CVE-2021-20262, it is recommended to update Keycloak to version 12.0.4 or apply any relevant patches provided by the vendor.
You can find more information about CVE-2021-20262 on the NIST National Vulnerability Database, Red Hat Bugzilla, and GitHub Advisories.