5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%
Keycloak does not correctly validate its client step-up authentication. A password-authed attacker could use this flaw to register a false second auth factor, alongside the existing one, to a targeted account. The second factor then permits step-up authentication.
CPE | Name | Operator | Version |
---|---|---|---|
org.keycloak:keycloak-services | ge | 23.0.0 | |
org.keycloak:keycloak-services | lt | 24.0.3 | |
org.keycloak:keycloak-services | lt | 22.0.10 |
access.redhat.com/errata/RHSA-2024:1867
access.redhat.com/errata/RHSA-2024:1868
access.redhat.com/security/cve/CVE-2023-3597
bugzilla.redhat.com/show_bug.cgi?id=2221760
github.com/advisories/GHSA-4f53-xh3v-g8x4
github.com/keycloak/keycloak/commit/aa634aee882892960a526e49982806e103c8a432
github.com/keycloak/keycloak/security/advisories/GHSA-4f53-xh3v-g8x4
nvd.nist.gov/vuln/detail/CVE-2023-3597
5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%