Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-4629
Analyzed
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Sep, 2024 | 20:15
Updated At-16 Sep, 2024 | 15:51

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

Red Hat, Inc.
redhat
>>keycloak>>Versions before 24.0.3(exclusive)
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>build_of_keycloak>>Versions from 22.0(inclusive) to 22.012(exclusive)
cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>-
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>Versions from 7.6(inclusive) to 7.6.10(exclusive)
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>7.0
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>9.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.11
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.12
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_linuxone>>4.9
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_linuxone>>4.10
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_power>>4.9
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_power>>4.10
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_ibm_z_systems>>4.9
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_ibm_z_systems>>4.10
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-837Primarysecalert@redhat.com
CWE ID: CWE-837
Type: Primary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2024:6493secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6494secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6495secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6497secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6499secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6500secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6501secalert@redhat.com
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2024-4629secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2276761secalert@redhat.com
Issue Tracking
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6493
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6494
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6495
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6497
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6499
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6500
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6501
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-4629
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2276761
Source: secalert@redhat.com
Resource:
Issue Tracking
Vendor Advisory
Change History
0Changes found

Details not found