CVE Vulnerabilities

CVE-2024-4629

Improper Enforcement of a Single, Unique Action

Published: Sep 03, 2024 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

Weakness

The product requires that an actor should only be able to perform an action once, or to have only one unique action, but the product does not enforce or improperly enforces this restriction.

Affected Software

Name Vendor Start Version End Version
Keycloak Redhat * 24.0.3 (excluding)
Red Hat Build of Keycloak RedHat org.keycloak-keycloak-parent *
Red Hat build of Keycloak 22 RedHat rhbk/keycloak-operator-bundle:22.0.12-1 *
Red Hat build of Keycloak 22 RedHat rhbk/keycloak-rhel9:22-17 *
Red Hat build of Keycloak 22 RedHat rhbk/keycloak-rhel9-operator:22-20 *
Red Hat Single Sign-On 7 RedHat org.keycloak-keycloak-parent *
Red Hat Single Sign-On 7.6 for RHEL 7 RedHat rh-sso7-keycloak-0:18.0.16-1.redhat_00001.1.el7sso *
Red Hat Single Sign-On 7.6 for RHEL 8 RedHat rh-sso7-keycloak-0:18.0.16-1.redhat_00001.1.el8sso *
Red Hat Single Sign-On 7.6 for RHEL 9 RedHat rh-sso7-keycloak-0:18.0.16-1.redhat_00001.1.el9sso *
RHEL-8 based Middleware Containers RedHat rh-sso-7/sso76-openshift-rhel8:7.6-52 *

References