{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-4629","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-05-07T20:47:03.184Z","datePublished":"2024-09-03T19:42:01.318Z","dateUpdated":"2026-03-26T23:13:50.144Z"},"containers":{"cna":{"title":"Keycloak: potential bypass of brute force protection","metrics":[{"other":{"content":{"value":"Low","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems."}],"affected":[{"versions":[{"status":"affected","version":"24.0.3"}],"packageName":"keycloak","collectionURL":"https://github.com/keycloak/keycloak"},{"vendor":"Red Hat","product":"Red Hat Build of Keycloak","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","defaultStatus":"unaffected","packageName":"org.keycloak-keycloak-parent","cpes":["cpe:/a:redhat:build_keycloak:22"]},{"vendor":"Red Hat","product":"Red Hat build of Keycloak 22","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhbk/keycloak-operator-bundle","defaultStatus":"affected","versions":[{"version":"22.0.12-1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:build_keycloak:22::el9"]},{"vendor":"Red Hat","product":"Red Hat build of Keycloak 22","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhbk/keycloak-rhel9","defaultStatus":"affected","versions":[{"version":"22-17","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:build_keycloak:22::el9"]},{"vendor":"Red Hat","product":"Red Hat build of Keycloak 22","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhbk/keycloak-rhel9-operator","defaultStatus":"affected","versions":[{"version":"22-20","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:build_keycloak:22::el9"]},{"vendor":"Red Hat","product":"Red Hat Single Sign-On 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","defaultStatus":"unaffected","packageName":"org.keycloak-keycloak-parent","cpes":["cpe:/a:redhat:red_hat_single_sign_on:7.6"]},{"vendor":"Red Hat","product":"Red Hat Single Sign-On 7.6 for RHEL 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rh-sso7-keycloak","defaultStatus":"affected","versions":[{"version":"0:18.0.16-1.redhat_00001.1.el7sso","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"]},{"vendor":"Red Hat","product":"Red Hat Single Sign-On 7.6 for RHEL 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rh-sso7-keycloak","defaultStatus":"affected","versions":[{"version":"0:18.0.16-1.redhat_00001.1.el8sso","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"]},{"vendor":"Red Hat","product":"Red Hat Single Sign-On 7.6 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rh-sso7-keycloak","defaultStatus":"affected","versions":[{"version":"0:18.0.16-1.redhat_00001.1.el9sso","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"]},{"vendor":"Red Hat","product":"RHEL-8 based Middleware Containers","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rh-sso-7/sso76-openshift-rhel8","defaultStatus":"affected","versions":[{"version":"7.6-52","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhosemc:1.0::el8"]},{"vendor":"Red Hat","product":"Red Hat JBoss Enterprise Application Platform 8","collectionURL":"https://access.redhat.com/jbossnetwork/restricted/listSoftware.html","packageName":"org.keycloak-keycloak-parent","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:jboss_enterprise_application_platform:8"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:6493","name":"RHSA-2024:6493","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6494","name":"RHSA-2024:6494","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6495","name":"RHSA-2024:6495","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6497","name":"RHSA-2024:6497","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6499","name":"RHSA-2024:6499","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6500","name":"RHSA-2024:6500","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6501","name":"RHSA-2024:6501","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2024-4629","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2276761","name":"RHBZ#2276761","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2024-09-03T19:38:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-837","description":"Improper Enforcement of a Single, Unique Action","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-837: Improper Enforcement of a Single, Unique Action","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2024-04-23T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2024-09-03T19:38:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-03-26T23:13:50.144Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-03T20:20:28.329028Z","id":"CVE-2024-4629","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-03T20:20:42.938Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-11-14T16:59:26.284Z"},"references":[{"url":"https://security.humanativaspa.it/an-analysis-of-the-keycloak-authentication-system/"},{"url":"https://github.com/hnsecurity/vulns/blob/main/HNS-2024-09-Keycloak.md"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}