First published: Tue Apr 23 2024(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-gc7q-jgjv-vjr2. This link is maintained to preserve external references. ## Original Description A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Keycloak | <24.0.3 | 24.0.3 |
maven/org.keycloak:keycloak-services | <=24.0.3 | 24.0.4 |
maven/org.keycloak:keycloak-services | >=25.0.0<25.0.4 | 25.0.4 |
maven/org.keycloak:keycloak-services | >=23.0.0<24.0.7 | 24.0.7 |
maven/org.keycloak:keycloak-services | <22.0.12 | 22.0.12 |
Red Hat Keycloak | <24.0.3 | |
Red Hat Keycloak | >=22.0<22.012 | |
Red Hat Single Sign-On | ||
All of | ||
Red Hat Single Sign-On | >=7.6<7.6.10 | |
Any of | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform for Power | =4.9 | |
Red Hat OpenShift Container Platform for Power | =4.10 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4629 has been classified as of moderate severity due to the potential for attackers to bypass brute force protection mechanisms.
To fix CVE-2024-4629, it is recommended to upgrade Keycloak to version 24.0.4 or later.
Keycloak versions up to and including 24.0.3 are affected by CVE-2024-4629.
Yes, CVE-2024-4629 has been publicly disclosed as it relates to a flaw in Keycloak.
CVE-2024-4629 enables attackers to potentially bypass established brute force protections, making systems more vulnerable to unauthorized access.