CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.5 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Keycloak. Affected is an unknown function of the component WebAuthn. The manipulation leads to improper authentication. This vulnerability is traded as CVE-2021-3632. There is no exploit available. It is recommended to apply a patch to fix this issue. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Details
A vulnerability, which was classified as critical, has been found in Keycloak (version unknown). This issue affects an unknown function of the component WebAuthn. The manipulation with an unknown input leads to a improper authentication vulnerability. Using CWE to declare the problem leads to CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.
The weakness was shared 08/26/2022. The advisory is shared at github.com. The identification of this vulnerability is CVE-2021-3632 since 07/01/2021. Neither technical details nor an exploit are publicly available.
Applying the patch 65480cb5a11630909c086f79d396004499fbd1e4 is able to eliminate this problem. The bugfix is ready for download at github.com.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.5
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 65480cb5a11630909c086f79d396004499fbd1e4
Timeline
07/01/2021 🔍08/26/2022 🔍
08/26/2022 🔍
10/02/2022 🔍
Sources
Advisory: 65480cb5a11630909c086f79d396004499fbd1e4Status: Confirmed
CVE: CVE-2021-3632 (🔍)
GCVE (CVE): GCVE-0-2021-3632
GCVE (VulDB): GCVE-100-207389
Entry
Created: 08/26/2022 20:46Updated: 10/02/2022 13:01
Changes: 08/26/2022 20:46 (39), 10/02/2022 12:55 (1), 10/02/2022 13:01 (11)
Complete: 🔍
Cache ID: 216:03A:103
No comments yet. Languages: en.
Please log in to comment.