{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-10973","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-11-07T16:42:52.079Z","datePublished":"2024-12-17T22:59:38.518Z","dateUpdated":"2025-11-20T18:12:13.352Z"},"containers":{"cna":{"title":"Keycloak: cli option for encrypted jgroups ignored","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information."}],"affected":[{"versions":[{"status":"unaffected","version":"22.0","lessThan":"23.0","versionType":"semver"},{"status":"unaffected","version":"24.0","lessThan":"25.0","versionType":"semver"},{"status":"unaffected","version":"26.0.6","lessThan":"*","versionType":"semver"}],"packageName":"keycloak","collectionURL":"https://github.com/keycloak/keycloak","defaultStatus":"affected"},{"vendor":"Red Hat","product":"Red Hat Build of Keycloak","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"org.keycloak/keycloak-quarkus-server","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:build_keycloak:"]},{"vendor":"Red Hat","product":"Red Hat JBoss Enterprise Application Platform 8","collectionURL":"https://access.redhat.com/jbossnetwork/restricted/listSoftware.html","packageName":"org.keycloak/keycloak-quarkus-server","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:jboss_enterprise_application_platform:8"]},{"vendor":"Red Hat","product":"Red Hat JBoss Enterprise Application Platform Expansion Pack","collectionURL":"https://access.redhat.com/jbossnetwork/restricted/listSoftware.html","packageName":"org.keycloak/keycloak-quarkus-server","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:jbosseapxp"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2024-10973","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324361","name":"RHBZ#2324361","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2024-11-07T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-319: Cleartext Transmission of Sensitive Information","timeline":[{"lang":"en","time":"2024-11-07T12:09:22.885Z","value":"Reported to Red Hat."},{"lang":"en","time":"2024-11-07T00:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank philliphnguyen for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-11-20T18:12:13.352Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-18T16:25:38.326417Z","id":"CVE-2024-10973","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-18T16:26:12.921Z"}}]}}