
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2020-35509) was discovered in Keycloak versions 11.0.3 and 12.0.0. The flaw involves the X509 Direct Grant Authentication mechanism failing to properly validate certificate timestamps, which could result in expired certificates being accepted by the direct-grant authenticator (Red Hat Portal).
The vulnerability specifically affects the X509 Direct Grant Authentication component in Keycloak, where the system fails to perform proper timestamp validations on certificates. This security flaw was rated as having a Moderate severity impact by Red Hat Product Security (RHSA-2021:3529).
The vulnerability could allow the acceptance of expired certificates during the authentication process, potentially compromising the security of the authentication mechanism (NVD).
The vulnerability has been fixed in Red Hat Single Sign-On 7.4.9. Users are advised to upgrade to this version to address the security issue. Before applying the update, it is recommended to back up existing installations, including all applications, configuration files, databases, and database settings (RHSA-2021:3534).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."