A flaw was found in Keycloak 4.2.1.Final, 4.3.0.Final. When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-14657 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 5.4 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat Single Sign-On 7.1 for RHEL 7 Server (rh-sso7-keycloak) | RHSA-2018:3593 | 2018-11-13 |
Red Hat Single Sign-On 7.2 | RHSA-2018:3595 | 2018-11-13 |
Red Hat Single Sign-On 7.1 for RHEL 6 Server (rh-sso7-keycloak) | RHSA-2018:3592 | 2018-11-13 |
Platform | Package | State |
---|---|---|
Red Hat Single Sign-On 7 | keycloak | Affected |
Red Hat Mobile Application Platform On-Premise 4 | keycloak | Under investigation |
Red Hat JBoss Fuse 7 | keycloak | Under investigation |