Search for vulnerabilities
Vulnerability ID | VCID-u2dq-vdqf-jbez |
Aliases |
CVE-2024-10039
GHSA-93ww-43rr-79v3 |
Summary | Keycloak mTLS Authentication Bypass via Reverse Proxy TLS Termination A vulnerability was found in Keycloak. Deployments of Keycloak with a reverse proxy not using pass-through termination of TLS, with mTLS enabled, are affected. This issue may allow an attacker on the local network to authenticate as any user or client that leverages mTLS as the authentication mechanism. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.0 |
Risk | 4.0 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3 | 7.1 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10039.json |
cvssv3.1_qr | HIGH | https://github.com/advisories/GHSA-93ww-43rr-79v3 |
cvssv3.1 | 7.1 | https://github.com/keycloak/keycloak |
generic_textual | HIGH | https://github.com/keycloak/keycloak |
cvssv3.1 | 7.1 | https://github.com/keycloak/keycloak/issues/35217 |
generic_textual | HIGH | https://github.com/keycloak/keycloak/issues/35217 |
cvssv3.1 | 7.1 | https://github.com/keycloak/keycloak/security/advisories/GHSA-93ww-43rr-79v3 |
cvssv3.1_qr | HIGH | https://github.com/keycloak/keycloak/security/advisories/GHSA-93ww-43rr-79v3 |
generic_textual | HIGH | https://github.com/keycloak/keycloak/security/advisories/GHSA-93ww-43rr-79v3 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:33:52.167089+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-93ww-43rr-79v3/GHSA-93ww-43rr-79v3.json | 37.0.0 |