Keycloak Login Timing Bypass Allows Exceeding Brute Force Limits
CVE-2024-4629 Published on September 3, 2024

Keycloak: potential bypass of brute force protection
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

Github Repository Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-4629 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
NONE

Timeline

Reported to Red Hat.

Made public. 133 days later.

Weakness Type

Improper Enforcement of a Single, Unique Action

The software requires that an actor should only be able to perform an action once, or to have only one unique action, but the software does not enforce or improperly enforces this restriction. In various applications, a user is only expected to perform a certain action once, such as voting, requesting a refund, or making a purchase. When this restriction is not enforced, sometimes this can have security implications. For example, in a voting application, an attacker could attempt to "stuff the ballot box" by voting multiple times. If these votes are counted separately, then the attacker could directly affect who wins the vote. This could have significant business impact depending on the purpose of the software.


Products Associated with CVE-2024-4629

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-4629 are published in these products:

 
 
 
 
 
 
 

Vulnerable Packages

The following package name and versions may be associated with CVE-2024-4629

Package Manager Vulnerable Package Versions Fixed In
maven org.keycloak:keycloak-services >= 23.0.0, < 24.0.7 24.0.7
maven org.keycloak:keycloak-services >= 25.0.0, < 25.0.4 25.0.4
maven org.keycloak:keycloak-services < 22.0.12 22.0.12

Exploit Probability

EPSS
1.09%
Percentile
77.62%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.