Search for vulnerabilities
Vulnerability details: VCID-e7da-njgp-aaak
Vulnerability ID VCID-e7da-njgp-aaak
Aliases CVE-2023-6484
GHSA-j628-q885-8gr5
Summary keycloak: Log Injection during WebAuthn authentication or registration
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:0798
ssvc Track https://access.redhat.com/errata/RHSA-2024:0798
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:0799
ssvc Track https://access.redhat.com/errata/RHSA-2024:0799
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:0800
ssvc Track https://access.redhat.com/errata/RHSA-2024:0800
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:0801
ssvc Track https://access.redhat.com/errata/RHSA-2024:0801
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:0804
ssvc Track https://access.redhat.com/errata/RHSA-2024:0804
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1860
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1860
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1861
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1861
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1862
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1862
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1864
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1864
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2024:1865
ssvc Track https://access.redhat.com/errata/RHSA-2024:1865
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1866
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1866
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2024:1867
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1867
cvssv3.1 7.4 https://access.redhat.com/errata/RHSA-2024:1868
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1868
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6484.json
cvssv3.1 5.3 https://access.redhat.com/security/cve/CVE-2023-6484
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.00394 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.01122 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
epss 0.0117 https://api.first.org/data/v1/epss?cve=CVE-2023-6484
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-j628-q885-8gr5
cvssv3.1 6.8 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 5.3 https://github.com/keycloak/keycloak/commit/110f64a8146d0817252f90cf4b5e6a62aa897aff
generic_textual MODERATE https://github.com/keycloak/keycloak/commit/110f64a8146d0817252f90cf4b5e6a62aa897aff
cvssv3.1 5.3 https://github.com/keycloak/keycloak/commit/f9049565a9a228faa08138b9269d66d3de6c7e9a
generic_textual MODERATE https://github.com/keycloak/keycloak/commit/f9049565a9a228faa08138b9269d66d3de6c7e9a
cvssv3.1 5.3 https://github.com/keycloak/keycloak/issues/25078
generic_textual MODERATE https://github.com/keycloak/keycloak/issues/25078
cvssv3.1_qr MODERATE https://github.com/keycloak/keycloak/security/advisories/GHSA-j628-q885-8gr5
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-6484
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-6484
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2024:1860
https://access.redhat.com/errata/RHSA-2024:1861
https://access.redhat.com/errata/RHSA-2024:1862
https://access.redhat.com/errata/RHSA-2024:1864
https://access.redhat.com/errata/RHSA-2024:1866
https://access.redhat.com/errata/RHSA-2024:1867
https://access.redhat.com/errata/RHSA-2024:1868
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6484.json
https://access.redhat.com/security/cve/CVE-2023-6484
https://api.first.org/data/v1/epss?cve=CVE-2023-6484
https://github.com/keycloak/keycloak
https://github.com/keycloak/keycloak/commit/110f64a8146d0817252f90cf4b5e6a62aa897aff
https://github.com/keycloak/keycloak/commit/f9049565a9a228faa08138b9269d66d3de6c7e9a
https://github.com/keycloak/keycloak/issues/25078
https://nvd.nist.gov/vuln/detail/CVE-2023-6484
2248423 https://bugzilla.redhat.com/show_bug.cgi?id=2248423
cpe:/a:redhat:build_keycloak:22 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22
cpe:/a:redhat:build_keycloak:22::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22::el9
cpe:/a:redhat:red_hat_single_sign_on:7.6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
GHSA-j628-q885-8gr5 https://github.com/advisories/GHSA-j628-q885-8gr5
GHSA-j628-q885-8gr5 https://github.com/keycloak/keycloak/security/advisories/GHSA-j628-q885-8gr5
RHSA-2024:0798 https://access.redhat.com/errata/RHSA-2024:0798
RHSA-2024:0799 https://access.redhat.com/errata/RHSA-2024:0799
RHSA-2024:0800 https://access.redhat.com/errata/RHSA-2024:0800
RHSA-2024:0801 https://access.redhat.com/errata/RHSA-2024:0801
RHSA-2024:0804 https://access.redhat.com/errata/RHSA-2024:0804
RHSA-2024:1865 https://access.redhat.com/errata/RHSA-2024:1865
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:0798
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:0798
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:0799
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:0799
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:0800
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:0800
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:0801
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:0801
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:0804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:0804
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1860
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1861
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1862
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1864
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:1865
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T14:33:06Z/ Found at https://access.redhat.com/errata/RHSA-2024:1865
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1866
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/errata/RHSA-2024:1867
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1868
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6484.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2023-6484
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/keycloak/keycloak/commit/110f64a8146d0817252f90cf4b5e6a62aa897aff
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/keycloak/keycloak/commit/f9049565a9a228faa08138b9269d66d3de6c7e9a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/keycloak/keycloak/issues/25078
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6484
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.18115
EPSS Score 0.00046
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-01-03T20:06:36.936641+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6484.json 34.0.0rc1