First published: Tue Jan 14 2025(Updated: )
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI. Network access to any of WildFly or JBoss EAP’s exposed ports which require either HTTP or SASL authentication.
Affected Software | Affected Version | How to fix |
---|---|---|
WildFly | ||
Red Hat JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2337621 is classified as a moderate vulnerability due to its potential to allow brute force attacks.
To fix REDHAT-BUG-2337621, implement account lockout mechanisms and rate limiting for authentication attempts.
REDHAT-BUG-2337621 affects Red Hat WildFly and JBoss EAP applications.
Mitigating risks for REDHAT-BUG-2337621 involves using strong passwords and enabling two-factor authentication.
REDHAT-BUG-2337621 makes the affected products vulnerable to brute force attacks via the CLI.