5.3
CVE-2024-1722
- EPSS 0.2%
- Veröffentlicht 29.02.2024 01:43:54
- Zuletzt bearbeitet 14.02.2025 17:24:40
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Keycloak-core: dos via account lockout
DoS via account lockout
A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in.
Mögliche Gegenmaßnahme
Keycloak Server: Install latest version
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.2% | 0.418 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
| secalert@redhat.com | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-645 Overly Restrictive Account Lockout Mechanism
The product contains an account lockout protection mechanism, but the mechanism is too restrictive and can be triggered too easily, which allows attackers to deny service to legitimate users by causing their accounts to be locked out.