Search for vulnerabilities
Vulnerability details: VCID-k2pw-c83c-aaaj
Vulnerability ID VCID-k2pw-c83c-aaaj
Aliases CVE-2023-6544
GHSA-46c8-635v-68r2
Summary Keycloak Authorization Bypass vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1860
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1860
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1861
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1861
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1862
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1862
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1864
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1864
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1866
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1866
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2024:1867
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1867
cvssv3.1 7.4 https://access.redhat.com/errata/RHSA-2024:1868
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1868
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6544.json
cvssv3.1 5.4 https://access.redhat.com/security/cve/CVE-2023-6544
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00262 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00438 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00514 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00529 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
epss 0.00762 https://api.first.org/data/v1/epss?cve=CVE-2023-6544
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-46c8-635v-68r2
cvssv3.1 6.8 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1_qr MODERATE https://github.com/keycloak/keycloak/security/advisories/GHSA-46c8-635v-68r2
cvssv3.1 5.4 https://nvd.nist.gov/vuln/detail/CVE-2023-6544
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-6544
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2024:1860
https://access.redhat.com/errata/RHSA-2024:1861
https://access.redhat.com/errata/RHSA-2024:1862
https://access.redhat.com/errata/RHSA-2024:1864
https://access.redhat.com/errata/RHSA-2024:1866
https://access.redhat.com/errata/RHSA-2024:1867
https://access.redhat.com/errata/RHSA-2024:1868
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6544.json
https://access.redhat.com/security/cve/CVE-2023-6544
https://api.first.org/data/v1/epss?cve=CVE-2023-6544
https://github.com/keycloak/keycloak
https://nvd.nist.gov/vuln/detail/CVE-2023-6544
2253116 https://bugzilla.redhat.com/show_bug.cgi?id=2253116
cpe:/a:redhat:build_keycloak:22 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22
cpe:/a:redhat:build_keycloak:22::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22::el9
cpe:/a:redhat:red_hat_single_sign_on:7.6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
GHSA-46c8-635v-68r2 https://github.com/advisories/GHSA-46c8-635v-68r2
GHSA-46c8-635v-68r2 https://github.com/keycloak/keycloak/security/advisories/GHSA-46c8-635v-68r2
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1860
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1861
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1862
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1864
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1866
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/errata/RHSA-2024:1867
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1868
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6544.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2023-6544
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6544
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.14083
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-04-23T17:39:21.520235+00:00 GHSA Importer Import https://github.com/advisories/GHSA-46c8-635v-68r2 34.0.0rc4