CVE Vulnerabilities

CVE-2021-3513

Insufficiently Protected Credentials

Published: Aug 22, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
KeycloakRedhat*13.0.0 (excluding)
Red Hat Single Sign-On 7.4.9RedHat*
Red Hat Single Sign-On 7.4 for RHEL 6RedHatrh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el6sso*
Red Hat Single Sign-On 7.4 for RHEL 7RedHatrh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el7sso*
Red Hat Single Sign-On 7.4 for RHEL 8RedHatrh-sso7-keycloak-0:9.0.15-1.redhat_00002.1.el8sso*

Potential Mitigations

References