Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-2585


Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.


Published

2018-03-12T15:29:00.397

Last Modified

2024-11-21T03:23:46.677

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat keycloak < 2.5.1 Yes
Application redhat single_sign_on 7.1 Yes
Application redhat single_sign_on 7.2 Yes
Operating System redhat enterprise_linux_server 6.0 No
Operating System redhat enterprise_linux_server 7.0 No

References