6.5
CVSSv2

CVE-2020-1714

Published: 13/05/2020 Updated: 19/10/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an malicious user to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

redhat decision manager 7.0

redhat jboss fuse 7.0.0

redhat openshift application runtimes -

redhat process automation 7.0

redhat single sign-on 7.0

quarkus quarkus

Vendor Advisories

Synopsis Important: RH-SSO 741 adapters for Red Hat JBoss Enterprise Application Platform 7 Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 741 adapters for Red Hat JBoss Enterprise Application Platform 73Red Hat Product Security has rated ...
Synopsis Important: Red Hat Process Automation Manager 781 Security Update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Process Automation ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scori ...
Synopsis Important: Red Hat build of Thorntail 270 security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat build of ThorntailRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: Red Hat Decision Manager 781 Security Update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Decision ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) bas ...
Synopsis Important: RH-SSO 741 adapters for Red Hat JBoss Enterprise Application Platform 6 Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 741 adapters for Red Hat JBoss Enterprise Application Platform 6Red Hat Product Security has rated th ...
Synopsis Important: Red Hat build of Quarkus 175 release and security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat build of QuarkusRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Syst ...
Synopsis Important: Red Hat support for Spring Boot 2115 security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat support for Spring BootRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: Red Hat Fuse 780 release and security update Type/Severity Security Advisory: Important Topic A minor version update (from 77 to 78) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Produc ...
Synopsis Important: Red Hat Single Sign-On 741 security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 74 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
A flaw was found in Keycloak, where the code base contains usages of ObjectInputStream without type checks This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution ...
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services CVE-2020-1714, CVE-2020-10693, CVE-2020-10740, CVE-2020-10758 Affected products and versions are listed below Please upgrade your version to the appropriate version ...