
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-47111 affects ZITADEL's lockout policy implementation. The vulnerability was discovered and disclosed on November 8, 2023, affecting ZITADEL versions prior to 2.38.3 and versions between 2.39.0 and 2.40.4. ZITADEL provides identity infrastructure with a lockout policy feature that limits failed password check attempts (GitHub Advisory).
The vulnerability is classified as a race condition in the lockout policy execution mechanism. It has a CVSS v3.1 base score of 7.3 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. The issue stems from improper handling of multiple parallel password check attempts, which could bypass the configured maximum attempt limit in the lockout policy (GitHub Advisory, NVD).
The vulnerability allows attackers to attempt more password combinations than what is configured in the lockout policy by initiating multiple parallel password checks. This effectively bypasses the security measure designed to prevent brute force attacks, potentially compromising account security (GitHub Advisory).
The vulnerability has been patched in ZITADEL versions 2.38.3 and 2.40.5. Users are advised to upgrade to these patched versions as there are no alternative workarounds available (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."