Vulnerability Description
A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with an existing one and bypass authentication.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-3597
- https://bugzilla.redhat.com/show_bug.cgi?id=2221760
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-3597
- https://bugzilla.redhat.com/show_bug.cgi?id=2221760
FAQ
What is CVE-2023-3597?
CVE-2023-3597 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to reg...
How severe is CVE-2023-3597?
CVE-2023-3597 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3597?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.