CVE-2024-4629

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

16 Sep 2024, 15:51

Type Values Removed Values Added
First Time Redhat openshift Container Platform Ibm Z Systems
Redhat
Redhat single Sign-on
Redhat openshift Container Platform For Linuxone
Redhat enterprise Linux
Redhat openshift Container Platform
Redhat keycloak
Redhat build Of Keycloak
Redhat openshift Container Platform For Power
References () https://access.redhat.com/errata/RHSA-2024:6493 - () https://access.redhat.com/errata/RHSA-2024:6493 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6494 - () https://access.redhat.com/errata/RHSA-2024:6494 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6495 - () https://access.redhat.com/errata/RHSA-2024:6495 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6497 - () https://access.redhat.com/errata/RHSA-2024:6497 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6499 - () https://access.redhat.com/errata/RHSA-2024:6499 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6500 - () https://access.redhat.com/errata/RHSA-2024:6500 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6501 - () https://access.redhat.com/errata/RHSA-2024:6501 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-4629 - () https://access.redhat.com/security/cve/CVE-2024-4629 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2276761 - () https://bugzilla.redhat.com/show_bug.cgi?id=2276761 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

09 Sep 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:6493 -
  • () https://access.redhat.com/errata/RHSA-2024:6494 -
  • () https://access.redhat.com/errata/RHSA-2024:6495 -
  • () https://access.redhat.com/errata/RHSA-2024:6497 -
  • () https://access.redhat.com/errata/RHSA-2024:6499 -
  • () https://access.redhat.com/errata/RHSA-2024:6500 -
  • () https://access.redhat.com/errata/RHSA-2024:6501 -

04 Sep 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Keycloak. Esta falla permite a los atacantes eludir la protección por fuerza bruta al explotar el tiempo de los intentos de inicio de sesión. Al iniciar múltiples solicitudes de inicio de sesión simultáneamente, los atacantes pueden superar los límites configurados para intentos fallidos antes de que el sistema los bloquee. Esta falla de tiempo permite a los atacantes realizar más intentos de adivinar contraseñas de lo previsto, lo que podría comprometer la seguridad de las cuentas en los sistemas afectados.

03 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-03 20:15

Updated : 2024-09-16 15:51


NVD link : CVE-2024-4629

Mitre link : CVE-2024-4629

CVE.ORG link : CVE-2024-4629


JSON object : View

Products Affected

redhat

  • build_of_keycloak
  • openshift_container_platform
  • openshift_container_platform_ibm_z_systems
  • openshift_container_platform_for_linuxone
  • enterprise_linux
  • single_sign-on
  • keycloak
  • openshift_container_platform_for_power
CWE
CWE-837

Improper Enforcement of a Single, Unique Action