A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:6493 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6494 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6495 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6497 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6499 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6500 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:6501 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2024-4629 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2276761 | Issue Tracking Vendor Advisory |
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-09-Keycloak.md | |
https://security.humanativaspa.it/an-analysis-of-the-keycloak-authentication-system/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2024-09-03 20:15
Updated : 2024-11-21 09:43
NVD link : CVE-2024-4629
Mitre link : CVE-2024-4629
CVE.ORG link : CVE-2024-4629
JSON object : View
Products Affected
redhat
- keycloak
- openshift_container_platform_for_linuxone
- openshift_container_platform_ibm_z_systems
- single_sign-on
- build_of_keycloak
- enterprise_linux
- openshift_container_platform_for_power
- openshift_container_platform
CWE
CWE-837
Improper Enforcement of a Single, Unique Action