The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability bulletin CVE-2018-14657

Keycloak: privilege escalation via TOPT Brute Force

Synthesis of the vulnerability

Impacted products: Red Hat SSO.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 14/11/2018.
Identifiers: CVE-2018-14657, RHSA-2018:3592-01, RHSA-2018:3593-01, RHSA-2018:3595-01, VIGILANCE-VUL-27778.

Description of the vulnerability

An attacker can bypass restrictions via TOPT Brute Force of Keycloak, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides systems vulnerabilities announces. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.