Oauth client impersonation
CVE-2023-2422
7.1HIGH
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 4 October 2023
Summary
A flaw in Keycloak's implementation of mTLS authentication for OAuth/OpenID clients allows clients with valid certificates to bypass proper verification of the client certificate chain. This vulnerability could enable a malicious client to impersonate other clients, potentially leading to unauthorized access to sensitive data. Organizations using Keycloak for identity and access management need to review their configurations to ensure robust security against this exploit.
Affected Version(s)
keycloak 18.0
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database