Vulnerability Description
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | < 24.0.3 |
| Redhat | Build Of Keycloak | >= 22.0, < 22.012 |
| Redhat | Single Sign-On | - |
| Redhat | Enterprise Linux | 7.0 |
| Redhat | Openshift Container Platform | 4.11 |
| Redhat | Openshift Container Platform For Linuxone | 4.9 |
| Redhat | Openshift Container Platform For Power | 4.9 |
| Redhat | Openshift Container Platform Ibm Z Systems | 4.9 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:6493Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6494Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6495Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6497Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6499Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6500Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:6501Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2024-4629Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2276761Issue TrackingVendor Advisory
- https://github.com/hnsecurity/vulns/blob/main/HNS-2024-09-Keycloak.md
- https://security.humanativaspa.it/an-analysis-of-the-keycloak-authentication-sys
FAQ
What is CVE-2024-4629?
CVE-2024-4629 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, att...
How severe is CVE-2024-4629?
CVE-2024-4629 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4629?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak, Redhat Build Of Keycloak, Redhat Single Sign-On, Redhat Enterprise Linux, Redhat Openshift Container Platform.