Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10451: Use of Hard-coded Credentials in Red Hat Red Hat build of Keycloak 24

0
Medium
VulnerabilityCVE-2024-10451cvecve-2024-10451
Published: Mon Nov 25 2024 (11/25/2024, 07:37:05 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 24

Description

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

AI-Powered Analysis

AILast updated: 11/11/2025, 16:37:42 UTC

Technical Analysis

CVE-2024-10451 is a vulnerability identified in the Red Hat build of Keycloak, an open-source identity and access management solution widely used for authentication and authorization services. The flaw arises during the build process of Keycloak versions up to 26.0.2, where sensitive runtime values, including passwords and other credentials specified in environment variables, are inadvertently captured and embedded as default values within the compiled bytecode. This occurs due to the unconditional expansion of environment variables by the PropertyMapper logic, which processes SPI options and Quarkus properties. As a result, sensitive data that should remain confidential becomes accessible during runtime, potentially exposing secrets to unauthorized parties who can inspect the bytecode or runtime environment. The vulnerability affects all Keycloak versions up to 26.0.2, with the Red Hat build of Keycloak 24 explicitly mentioned. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with a vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No known exploits have been reported in the wild, but the nature of the vulnerability means that if exploited, attackers could gain access to sensitive credentials embedded in the application, potentially leading to further compromise of systems relying on Keycloak for authentication.

Potential Impact

For European organizations, the primary impact of CVE-2024-10451 is the potential exposure of sensitive credentials embedded within the Keycloak runtime environment. This can lead to unauthorized access to identity and access management systems, undermining the confidentiality of user credentials and potentially enabling lateral movement within networks. Given Keycloak's role in managing authentication for numerous applications and services, credential leakage could cascade into broader security breaches, including unauthorized data access or privilege escalation. The vulnerability does not directly affect system integrity or availability but compromises the confidentiality of critical secrets. Organizations relying on Red Hat's Keycloak build, especially in sectors with stringent data protection requirements such as finance, healthcare, and government, face increased risk of regulatory non-compliance and reputational damage if sensitive data is exposed. The medium severity rating suggests that while exploitation is not trivial, the potential consequences warrant timely remediation to prevent information disclosure.

Mitigation Recommendations

To mitigate CVE-2024-10451, European organizations should implement the following specific measures: 1) Review and sanitize all environment variables used during the Keycloak build process to ensure no sensitive data such as passwords or secrets are directly specified or exposed. 2) Upgrade to Keycloak versions later than 26.0.2 where this vulnerability has been addressed or apply vendor-provided patches as soon as they become available. 3) Implement strict build environment controls, including segregating build and runtime environments to prevent leakage of sensitive build-time data into runtime artifacts. 4) Use secure secret management solutions to inject secrets at runtime rather than embedding them during build time. 5) Conduct thorough code and bytecode audits to detect any embedded sensitive information before deployment. 6) Monitor Keycloak runtime environments for unusual access patterns that might indicate exploitation attempts. 7) Limit network exposure of Keycloak instances to trusted internal networks or VPNs to reduce attack surface. 8) Educate development and DevOps teams about secure build practices and the risks of embedding secrets in code artifacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-28T07:34:31.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691362a4f922b639ab5baf85

Added to database: 11/11/2025, 4:21:56 PM

Last enriched: 11/11/2025, 4:37:42 PM

Last updated: 11/24/2025, 4:59:29 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats