5.9
CVSSv3

CVE-2017-2585

Published: 12/03/2018 Updated: 12/04/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

redhat single_sign_on 7.1

redhat single_sign_on 7.2

Vendor Advisories

Synopsis Moderate: Red Hat Single Sign-On 71 update on RHEL 7 Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sys ...
Synopsis Moderate: Red Hat Single Sign-On 71 update Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for download from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System ...
Synopsis Moderate: Red Hat Single Sign-On 71 update on RHEL 6 Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sys ...
It was found that keycloak's implementation of HMAC verification for JWS tokens uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks ...