Vulnerability in Keycloak Account REST API Allows Account Takeover via MFA Manipulation
CVE-2026-3429

4.2MEDIUM

What is CVE-2026-3429?

CVE-2026-3429 is a vulnerability found in the Account REST API of Keycloak, an open-source identity and access management tool developed by Red Hat. This vulnerability permits attackers with lower-level authenticated access to perform sensitive operations that should only be available to users authenticated at a higher security level. Specifically, it allows a malicious actor who has compromised a user's password to delete the victim's multi-factor authentication (MFA) credentials without verifying possession of the MFA factor. By doing so, the attacker can register their own MFA device, thereby gaining full control over the victim's account. This flaw fundamentally weakens the security model of multi-factor authentication, which is critical in protecting sensitive user accounts from unauthorized access and exploitation.

Potential Impact of CVE-2026-3429

  1. Account Takeover: The vulnerability allows attackers to fully compromise user accounts, leading to potential unauthorized access to sensitive information or systems, which can result in significant data breaches.

  2. Undermined MFA Security: By circumventing the protections of multi-factor authentication, organizations relying on Keycloak for secure user access may find their security measures are ineffective, potentially leading to a broader systemic security risk.

  3. Increased Attack Surface: As the vulnerability could be exploited by anyone who has already gained access to a valid user password, this increases the risk of both targeted and opportunistic attacks, necessitating enhanced monitoring and incident response efforts.

Affected Version(s)

Red Hat build of Keycloak 26.4 26.4.11-1

Red Hat build of Keycloak 26.4 26.4-14

Red Hat build of Keycloak 26.4 26.4-14

References

CVSS V3.1

Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank hamayanhamayan for reporting this issue.
.