Bug 1953439 (CVE-2021-3513)

Summary: CVE-2021-3513 keycloak: Brute force attack is possible even after the account lockout
Product: [Other] Security Response Reporter: Paramvir jindal <pjindal>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, chazlett, drieden, krathod, pdrozd, pjindal, sthorger
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: keycloak 13.0.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-09-14 18:21:15 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1953432, 1953561    

Description Paramvir jindal 2021-04-26 06:33:02 UTC
Even though Permanent Lockout is a feature of Brute Force Detection, it doesn't protect the account from exposing his/hers credentials.
Once the account is locked, the malicious actor can keep trying to login and will get informed the account is disabled once the password is correct.

https://issues.redhat.com/browse/KEYCLOAK-17835

Comment 2 Paramvir jindal 2021-05-11 07:01:32 UTC
Acknowledgments:

Name: MichaƂ Knapik & Peter Nicholson (u2i)

Comment 5 errata-xmlrpc 2021-09-14 12:31:21 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 7

Via RHSA-2021:3528 https://access.redhat.com/errata/RHSA-2021:3528

Comment 6 errata-xmlrpc 2021-09-14 12:32:25 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 8

Via RHSA-2021:3529 https://access.redhat.com/errata/RHSA-2021:3529

Comment 7 errata-xmlrpc 2021-09-14 12:34:32 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 6

Via RHSA-2021:3527 https://access.redhat.com/errata/RHSA-2021:3527

Comment 8 errata-xmlrpc 2021-09-14 12:37:46 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.9

Via RHSA-2021:3534 https://access.redhat.com/errata/RHSA-2021:3534

Comment 9 Product Security DevOps Team 2021-09-14 18:21:15 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3513