Описание
A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.
Отчет
This finding was marked Moderate because it is a 2x increase, which is not too long. Red Hat has evaluated this vulnerability and it only affects the Red Hat Build of Keycloak (RHBK). Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-324: Use of a Key Past its Expiration Date vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces strong cryptographic practices through authenticated cryptographic modules, key lifecycle management, and continuous monitoring. Module authentication ensures only authorized cryptographic modules are used, preventing reliance on unauthorized or outdated keys. Approved cryptographic methods mandate the use of federally recognized encryption standards, reducing the risk of insecure or expired key usage. Key management controls ensure secure key distribution, scheduled retirement, and enforcement of expiration dates to prevent the use of outdated keys. Revocation mechanisms allow prompt invalidation of compromised or expired keys, while system monitoring detects and responds to unauthorized key usage. Together, these controls preserve cryptographic integrity and reduce the attack surface by ensuring expired keys are promptly identified, revoked, and replaced.
Дополнительная информация
Статус:
EPSS
4.8 Medium
CVSS3
Связанные уязвимости
A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.
A vulnerability was found in Keycloak. Expired OTP codes are still usa ...
Keycloaks's One Time Passcode (OTP) is valid longer than expiration timeSeverity
EPSS
4.8 Medium
CVSS3