CVE-2021-3632Improper Authentication in Redhat Keycloak

Severity
7.5HIGHNVD
EPSS
0.5%
top 33.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 26
Latest updateAug 27

Description

A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages3 packages

NVDredhat/keycloak< 15.1.0
CVEListV5redhat/keycloakFixed in v15.1.0
NVDredhat/single_sign-on7.47.4.9+1

Patches

🔴Vulnerability Details

3
GHSA
Keycloak allows anyone to register new security device or key for any user by using WebAuthn password-less login flow2022-08-27
OSV
Keycloak allows anyone to register new security device or key for any user by using WebAuthn password-less login flow2022-08-27
CVEList
CVE-2021-3632: A flaw was found in Keycloak2022-08-26

📋Vendor Advisories

1
Red Hat
keycloak: Anyone can register a new device when there is no device registered for passwordless login2021-06-12