First published: Sat Jun 12 2021(Updated: )
A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el6 | 0:9.0.15-1.redhat_00002.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el7 | 0:9.0.15-1.redhat_00002.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el8 | 0:9.0.15-1.redhat_00002.1.el8 |
Redhat Keycloak | <15.1.0 | |
Redhat Single Sign-on | =7.0 | |
Redhat Single Sign-on | >=7.4<7.4.9 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3632 is a vulnerability in Keycloak that allows anyone to register a new security device or key using the WebAuthn password-less login flow.
The severity of CVE-2021-3632 is high with a severity value of 7.5.
CVE-2021-3632 affects versions 0:9.0.15-1.redhat_00002.1.el6, 0:9.0.15-1.redhat_00002.1.el7, and 0:9.0.15-1.redhat_00002.1.el8 of rh-sso7-keycloak on Red Hat Enterprise Linux.
To fix CVE-2021-3632, update rh-sso7-keycloak to a version higher than 0:9.0.15-1.redhat_00002.1.el6, 0:9.0.15-1.redhat_00002.1.el7, or 0:9.0.15-1.redhat_00002.1.el8.
You can find more information about CVE-2021-3632 at the following references: [1] [2] [3].