Summary: If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user. Requirements to exploit: Keycloak configured with Brute Force Protection Component affected: org.keycloak:keycloak-services (Authentication) Version affected: <= 24.0.3
This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2024:6499 https://access.redhat.com/errata/RHSA-2024:6499
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2024:6493 https://access.redhat.com/errata/RHSA-2024:6493
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2024:6494 https://access.redhat.com/errata/RHSA-2024:6494
This issue has been addressed in the following products: Red Hat build of Keycloak 22 Via RHSA-2024:6501 https://access.redhat.com/errata/RHSA-2024:6501
This issue has been addressed in the following products: Red Hat build of Keycloak 22 Via RHSA-2024:6500 https://access.redhat.com/errata/RHSA-2024:6500
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2024:6495 https://access.redhat.com/errata/RHSA-2024:6495
This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2024:6497 https://access.redhat.com/errata/RHSA-2024:6497