Keycloak Authentication Bypass Vulnerability
CVE-2023-3597
5MEDIUM
Key Information:
- Vendor
- Red Hat
- Vendor
- CVE Published:
- 25 April 2024
Summary
A security flaw exists in Keycloak, where the system fails to accurately validate client step-up authentication processes. This creates a potential risk whereby an authenticated remote user can register a fraudulent second authentication factor alongside an existing one. Utilizing this vulnerability, attackers could bypass the intended security measures, allowing them unauthorized access to sensitive resources. Proper validation mechanisms are crucial to ensure that the authentication process functions as intended, safeguarding against unauthorized actions.
References
CVSS V3.1
Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Johannes Bergmann (Bosch) for reporting this issue.