Search for vulnerabilities
Vulnerability details: VCID-xzss-xmpe-jfcg
Vulnerability ID VCID-xzss-xmpe-jfcg
Aliases CVE-2023-2422
GHSA-3qh5-qqj2-c78f
Summary Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients When a Keycloak server is configured to support mTLS authentication for OAuth/OpenID clients, it does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client and therefore access data that belongs to other clients.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.5 https://access.redhat.com/errata/RHSA-2023:3883
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2023:3883
generic_textual HIGH https://access.redhat.com/errata/RHSA-2023:3883
ssvc Track https://access.redhat.com/errata/RHSA-2023:3883
cvssv3.1 5.5 https://access.redhat.com/errata/RHSA-2023:3884
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2023:3884
generic_textual HIGH https://access.redhat.com/errata/RHSA-2023:3884
ssvc Track https://access.redhat.com/errata/RHSA-2023:3884
cvssv3.1 5.5 https://access.redhat.com/errata/RHSA-2023:3885
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2023:3885
generic_textual HIGH https://access.redhat.com/errata/RHSA-2023:3885
ssvc Track https://access.redhat.com/errata/RHSA-2023:3885
cvssv3.1 5.5 https://access.redhat.com/errata/RHSA-2023:3888
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2023:3888
generic_textual HIGH https://access.redhat.com/errata/RHSA-2023:3888
ssvc Track https://access.redhat.com/errata/RHSA-2023:3888
cvssv3.1 5.5 https://access.redhat.com/errata/RHSA-2023:3892
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2023:3892
generic_textual HIGH https://access.redhat.com/errata/RHSA-2023:3892
ssvc Track https://access.redhat.com/errata/RHSA-2023:3892
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
cvssv3.1 5.5 https://access.redhat.com/security/cve/CVE-2023-2422
cvssv3.1 7.1 https://access.redhat.com/security/cve/CVE-2023-2422
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2023-2422
ssvc Track https://access.redhat.com/security/cve/CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2023-2422
cvssv3.1 5.5 https://bugzilla.redhat.com/show_bug.cgi?id=2191668
cvssv3.1 7.1 https://bugzilla.redhat.com/show_bug.cgi?id=2191668
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2191668
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2191668
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-3qh5-qqj2-c78f
cvssv3.1 7.1 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 7.1 https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
generic_textual HIGH https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
cvssv3.1 7.1 https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
generic_textual HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
cvssv3.1 7.1 https://nvd.nist.gov/vuln/detail/CVE-2023-2422
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-2422
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
https://access.redhat.com/security/cve/CVE-2023-2422
https://api.first.org/data/v1/epss?cve=CVE-2023-2422
https://bugzilla.redhat.com/show_bug.cgi?id=2191668
https://github.com/keycloak/keycloak
https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
https://nvd.nist.gov/vuln/detail/CVE-2023-2422
cpe:/a:redhat:red_hat_single_sign_on:7.6.4 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6.4
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
GHSA-3qh5-qqj2-c78f https://github.com/advisories/GHSA-3qh5-qqj2-c78f
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3883
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3883
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/errata/RHSA-2023:3883
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3884
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3884
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/errata/RHSA-2023:3884
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3885
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3885
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/errata/RHSA-2023:3885
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3888
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3888
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/errata/RHSA-2023:3888
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:3892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/errata/RHSA-2023:3892
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2422.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://access.redhat.com/security/cve/CVE-2023-2422
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T18:15:34Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-2422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.44384
EPSS Score 0.00217
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:45:08.406575+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-3qh5-qqj2-c78f/GHSA-3qh5-qqj2-c78f.json 37.0.0