383
VMScore

CVE-2017-2585

Published: 12/03/2018 Updated: 12/04/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

redhat single sign on 7.1

redhat single sign on 7.2

Vendor Advisories

Synopsis Moderate: Red Hat Single Sign-On 71 update on RHEL 7 Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sys ...
Synopsis Moderate: Red Hat Single Sign-On 71 update Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for download from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System ...
Synopsis Moderate: Red Hat Single Sign-On 71 update on RHEL 6 Type/Severity Security Advisory: Moderate Topic Red Hat Single Sign-On 71 is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sys ...
It was found that keycloak's implementation of HMAC verification for JWS tokens uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks ...