5

CVE-2023-3597

Keycloak: secondary factor bypass in step-up authentication

Secondary factor bypass in step-up authentication

A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with an existing one and bypass authentication.
Mögliche Gegenmaßnahme
Keycloak Server: Install latest version
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://www.keycloak.org/
Paket keycloak
Default Statusunaffected
Version 0
Version < 22.0.10
Status affected
Version 23.0.0
Version < 24.0.3
Status affected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22.0.10-1
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22-13
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22-16
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22.0.10
Default Statusunaffected
HerstellerRed Hat
Produkt RHSSO 7.6.8
Default Statusunaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemKeycloak
Produkt Keycloak Server
Version >= 0.0.0, < 22.0.10
Version >= 24.0.0, < 24.0.3
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.259
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secalert@redhat.com 5 1.6 3.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.