Keycloak Login Timing Bypass Allows Exceeding Brute Force Limits
CVE-2024-4629 Published on September 3, 2024
Keycloak: potential bypass of brute force protection
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
Vulnerability Analysis
CVE-2024-4629 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Timeline
Reported to Red Hat.
Made public. 133 days later.
Weakness Type
Improper Enforcement of a Single, Unique Action
The software requires that an actor should only be able to perform an action once, or to have only one unique action, but the software does not enforce or improperly enforces this restriction. In various applications, a user is only expected to perform a certain action once, such as voting, requesting a refund, or making a purchase. When this restriction is not enforced, sometimes this can have security implications. For example, in a voting application, an attacker could attempt to "stuff the ballot box" by voting multiple times. If these votes are counted separately, then the attacker could directly affect who wins the vote. This could have significant business impact depending on the purpose of the software.
Products Associated with CVE-2024-4629
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-4629 are published in these products:
Vulnerable Packages
The following package name and versions may be associated with CVE-2024-4629
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| maven | org.keycloak:keycloak-services | >= 23.0.0, < 24.0.7 | 24.0.7 |
| maven | org.keycloak:keycloak-services | >= 25.0.0, < 25.0.4 | 25.0.4 |
| maven | org.keycloak:keycloak-services | < 22.0.12 | 22.0.12 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.