Search for vulnerabilities
Vulnerability details: VCID-sneg-t9mh-aaae
Vulnerability ID VCID-sneg-t9mh-aaae
Aliases CVE-2023-2422
GHSA-3qh5-qqj2-c78f
Summary Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 3.5 https://access.redhat.com/errata/RHSA-2023:3883
generic_textual LOW https://access.redhat.com/errata/RHSA-2023:3883
cvssv3.1 3.5 https://access.redhat.com/errata/RHSA-2023:3884
generic_textual LOW https://access.redhat.com/errata/RHSA-2023:3884
cvssv3.1 3.5 https://access.redhat.com/errata/RHSA-2023:3885
generic_textual LOW https://access.redhat.com/errata/RHSA-2023:3885
cvssv3.1 3.5 https://access.redhat.com/errata/RHSA-2023:3888
generic_textual LOW https://access.redhat.com/errata/RHSA-2023:3888
cvssv3.1 3.5 https://access.redhat.com/errata/RHSA-2023:3892
generic_textual LOW https://access.redhat.com/errata/RHSA-2023:3892
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
cvssv3.1 5.5 https://access.redhat.com/security/cve/CVE-2023-2422
ssvc Track https://access.redhat.com/security/cve/CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00533 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-3qh5-qqj2-c78f
cvssv3.1 6.8 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 7.1 https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
generic_textual HIGH https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
cvssv3 7.1 https://nvd.nist.gov/vuln/detail/CVE-2023-2422
cvssv3.1 7.1 https://nvd.nist.gov/vuln/detail/CVE-2023-2422
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
https://api.first.org/data/v1/epss?cve=CVE-2023-2422
https://github.com/keycloak/keycloak
https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
2191668 https://bugzilla.redhat.com/show_bug.cgi?id=2191668
cpe:/a:redhat:red_hat_single_sign_on:7.6.4 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6.4
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
CVE-2023-2422 https://access.redhat.com/security/cve/CVE-2023-2422
CVE-2023-2422 https://nvd.nist.gov/vuln/detail/CVE-2023-2422
GHSA-3qh5-qqj2-c78f https://github.com/advisories/GHSA-3qh5-qqj2-c78f
GHSA-3qh5-qqj2-c78f https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3883
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3884
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3885
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3888
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/security/cve/CVE-2023-2422
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.52688
EPSS Score 0.00156
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.