Description

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

INFO

Published Date :

2024-09-03T19:42:01.318Z

Last Modified :

2026-03-26T23:13:50.144Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4629 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Build Of Keycloak
  • Enterprise Linux
  • Jboss Enterprise Application Platform
  • Keycloak
  • Openshift Container Platform
  • Openshift Container Platform For Linuxone
  • Openshift Container Platform For Power
  • Openshift Container Platform Ibm Z Systems
  • Red Hat Single Sign On
  • Rhosemc
  • Single Sign-on

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact