Bug 2337621 (CVE-2025-23368)

Summary: CVE-2025-23368 org.wildfly.core:wildfly-elytron-integration: Wildfly Elytron Brute Force Attack via CLI
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: asoldano, bbaranow, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, cmiranda, cybersploit999, darran.lofthouse, dhanak, dkreling, dosoudil, drichtar, ecerquei, fjuma, gmalinko, ibek, istudens, ivassile, iweiss, janstey, jkoops, jrokos, kverlaen, lgao, mnovotny, mosmerov, msochure, msvehla, nwallace, pcongius, pdelbell, pdrozd, peholase, pesilva, pjindal, pmackay, pskopek, rguimara, rmartinc, rowaters, rstancel, rstepani, security-response-team, smaestri, sthorger, tom.jenkinson
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2025-03-03   

Description OSIDB Bzimport 2025-01-14 15:39:44 UTC
The product does not implement sufficient measures to prevent multiple
failed authentication attempts within a short time frame, making it more susceptible
to brute force attacks via CLI.

Network access to any of WildFly or JBoss EAP’s exposed ports which require either HTTP or SASL authentication.