CVE-2020-1744 — Improper Handling of Exceptional Conditions in Redhat Keycloak
Severity
5.6MEDIUMNVD
EPSS
0.3%
top 43.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 24
Latest updateSep 20
Description
A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.2 | Impact: 3.4
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Red Hat▶
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP↗2020-03-23
💬Community
1Bugzilla▶
CVE-2020-1744 keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP↗2020-02-21