CVE Vulnerabilities

CVE-2021-3513

Insufficiently Protected Credentials

Published: Aug 22, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

Name Vendor Start Version End Version
Keycloak Redhat * 13.0.0 (excluding)
Red Hat Single Sign-On 7.4.9 RedHat keycloak *
Red Hat Single Sign-On 7.4 for RHEL 6 RedHat rh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el6sso *
Red Hat Single Sign-On 7.4 for RHEL 7 RedHat rh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el7sso *
Red Hat Single Sign-On 7.4 for RHEL 8 RedHat rh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el8sso *

Potential Mitigations

References