#VU72726 Configuration in Red Hat Single Sign-On


Published: 2023-03-02

Vulnerability identifier: #VU72726

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-4039

CWE-ID: CWE-16

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Red Hat Single Sign-On
Server applications / Directory software, identity management

Vendor: Red Hat Inc.

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to Keycloak instances launched by the Operator are configured with an unsecured management interface enabled. A remote attacker on the local network can use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Red Hat Single Sign-On: 7.1 - 7.6.1


External links
http://bugzilla.redhat.com/show_bug.cgi?id=2143416


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability