Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q8hq-4h99-fj7x

Опубликовано: 27 окт. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Keycloak TLS Client-Initiated Renegotiation Denial of Service

Keycloak is vulnerable to a Denial of Service (DoS) attack due to the default JDK setting that permits Client-Initiated Renegotiation in TLS 1.2. An unauthenticated remote attacker can repeatedly initiate TLS renegotiation requests to exhaust server CPU resources, making the service unavailable. Immediate mitigation is available by setting the -Djdk.tls.rejectClientInitiatedRenegotiation=true Java system property in the Keycloak startup configuration.

Пакеты

Наименование

org.keycloak:keycloak-quarkus-dist

maven
Затронутые версииВерсия исправления

< 26.0.16

26.0.16

Наименование

org.keycloak:keycloak-quarkus-dist

maven
Затронутые версииВерсия исправления

>= 26.1.0, < 26.2.10

26.2.10

Наименование

org.keycloak:keycloak-quarkus-dist

maven
Затронутые версииВерсия исправления

>= 26.3.0, < 26.4.1

26.4.1

EPSS

Процентиль: 42%
0.00204
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-770

Связанные уязвимости

CVSS3: 7.5
nvd
около 2 месяцев назад

A flaw was found in Keycloak. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) by repeatedly initiating TLS 1.2 client-initiated renegotiation requests to exhaust server CPU resources, making the service unavailable.

CVSS3: 7.5
debian
около 2 месяцев назад

A flaw was found in Keycloak. This vulnerability allows an unauthentic ...

EPSS

Процентиль: 42%
0.00204
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-770