
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2024-10039) was identified in Keycloak, affecting deployments with reverse proxies not using pass-through termination of TLS. The issue was disclosed in November 2024 and impacts Keycloak's core functionality, particularly in configurations where TLS termination is handled by intermediate proxies (Red Hat Portal).
The vulnerability is related to mTLS (mutual TLS) passthrough functionality in Keycloak's core components. This security issue has been addressed in Keycloak version 26.0.6, which includes fixes for this and several other security vulnerabilities (Red Hat Advisory).
The vulnerability affects Keycloak deployments where reverse proxies are configured without TLS pass-through termination, potentially impacting the security of authentication processes and TLS communication (Red Hat Portal).
Red Hat has released version 26.0.6 of Keycloak which addresses this vulnerability. Users are advised to upgrade to this version to mitigate the security risk. The fix is available through both standalone packages and container images for OpenShift Container Platform deployments (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."