First published: Wed Feb 21 2024(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-cq42-vhv7-xr7p. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <24.0.0 | 24.0.0 |
maven/org.keycloak:keycloak-core | <=23.0.5 | 24.0.0 |
Keycloak | =23.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1722 is determined to be high due to the potential for remote unauthenticated access under specific conditions.
To mitigate CVE-2024-1722, users should upgrade Keycloak to version 24.0.0 or later.
CVE-2024-1722 affects Keycloak versions up to and including 23.0.5.
As of now, there are no public reports indicating that CVE-2024-1722 is actively exploited in the wild.
CVE-2024-1722 specifically impacts the keycloak-services and keycloak-core packages of Keycloak.