First published: Mon Apr 26 2021(Updated: )
A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el6 | 0:9.0.15-1.redhat_00002.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el7 | 0:9.0.15-1.redhat_00002.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el8 | 0:9.0.15-1.redhat_00002.1.el8 |
Redhat Keycloak | <13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3513 is a vulnerability in Keycloak that allows for a brute force attack even when the permanent lockout feature is enabled.
The severity of CVE-2021-3513 is high.
CVE-2021-3513 poses a threat to confidentiality.
The remedy for CVE-2021-3513 in Keycloak 13.0.0 is to upgrade to version 13.0.1 or later.
The remedy for CVE-2021-3513 in RH-SSO7 Keycloak is to upgrade to version 9.0.16 or later on EL6, EL7, or EL8.