CVE-2024-10451: Use of Hard-coded Credentials in Red Hat Red Hat build of Keycloak 24
A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.
AI Analysis
Technical Summary
CVE-2024-10451 is a vulnerability identified in Red Hat's build of Keycloak, an open-source identity and access management solution. The flaw arises because sensitive runtime values, including passwords, can be captured during the Keycloak build process and embedded as default values within the compiled bytecode. This embedding happens due to the unconditional expansion of environment variables by the PropertyMapper logic, which processes SPI options and Quarkus properties. In Keycloak version 24, sensitive data specified during the build can be inadvertently included in the bytecode, and in version 26, this issue extends to environment variables specified directly during the build process. The vulnerability leads to unintended information disclosure, as these embedded sensitive values may be accessible during runtime, potentially exposing credentials or secrets to unauthorized parties. The CVSS 3.1 score of 5.9 reflects a medium severity, with a vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits have been reported in the wild yet, but the flaw poses a risk to confidentiality in environments relying on affected Keycloak builds for authentication and authorization services.
Potential Impact
The primary impact of CVE-2024-10451 is the unintended disclosure of sensitive information such as passwords embedded in the Keycloak bytecode. This compromises confidentiality, potentially allowing attackers to retrieve credentials or secrets that could be used to escalate privileges, access protected resources, or move laterally within an organization’s network. Although the vulnerability does not directly affect integrity or availability, the exposure of sensitive runtime data can undermine trust in the identity management system and lead to broader security breaches. Organizations using Red Hat builds of Keycloak, especially in critical infrastructure or large-scale deployments, face increased risk of credential leakage. The medium severity rating reflects the complexity of exploitation, as attackers must gain access to the runtime environment or bytecode to extract the embedded secrets. However, the lack of required privileges or user interaction lowers the barrier for exploitation once access is obtained. The absence of known exploits in the wild suggests that immediate widespread attacks are unlikely, but the vulnerability remains a significant concern for confidentiality in identity management systems globally.
Mitigation Recommendations
To mitigate CVE-2024-10451, organizations should: 1) Avoid embedding sensitive data such as passwords directly in environment variables during the Keycloak build process. Use secure vaults or secret management tools to inject secrets at runtime rather than build time. 2) Review and sanitize build pipelines to ensure no sensitive runtime values are captured or hard-coded into bytecode. 3) Monitor and audit Keycloak bytecode and configuration artifacts for embedded secrets using static analysis or secret scanning tools. 4) Upgrade to the latest Keycloak versions where this issue is addressed or patched by Red Hat once available. 5) Implement strict access controls around build environments and artifact repositories to prevent unauthorized access to potentially sensitive bytecode. 6) Employ runtime monitoring to detect unusual access patterns that may indicate attempts to extract embedded secrets. 7) Educate development and DevOps teams about the risks of hard-coded credentials and enforce best practices for secret management throughout the software development lifecycle.
Affected Countries
United States, Germany, India, United Kingdom, France, Japan, Canada, Australia, Brazil, Netherlands, South Korea, Singapore
CVE-2024-10451: Use of Hard-coded Credentials in Red Hat Red Hat build of Keycloak 24
Description
A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-10451 is a vulnerability identified in Red Hat's build of Keycloak, an open-source identity and access management solution. The flaw arises because sensitive runtime values, including passwords, can be captured during the Keycloak build process and embedded as default values within the compiled bytecode. This embedding happens due to the unconditional expansion of environment variables by the PropertyMapper logic, which processes SPI options and Quarkus properties. In Keycloak version 24, sensitive data specified during the build can be inadvertently included in the bytecode, and in version 26, this issue extends to environment variables specified directly during the build process. The vulnerability leads to unintended information disclosure, as these embedded sensitive values may be accessible during runtime, potentially exposing credentials or secrets to unauthorized parties. The CVSS 3.1 score of 5.9 reflects a medium severity, with a vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits have been reported in the wild yet, but the flaw poses a risk to confidentiality in environments relying on affected Keycloak builds for authentication and authorization services.
Potential Impact
The primary impact of CVE-2024-10451 is the unintended disclosure of sensitive information such as passwords embedded in the Keycloak bytecode. This compromises confidentiality, potentially allowing attackers to retrieve credentials or secrets that could be used to escalate privileges, access protected resources, or move laterally within an organization’s network. Although the vulnerability does not directly affect integrity or availability, the exposure of sensitive runtime data can undermine trust in the identity management system and lead to broader security breaches. Organizations using Red Hat builds of Keycloak, especially in critical infrastructure or large-scale deployments, face increased risk of credential leakage. The medium severity rating reflects the complexity of exploitation, as attackers must gain access to the runtime environment or bytecode to extract the embedded secrets. However, the lack of required privileges or user interaction lowers the barrier for exploitation once access is obtained. The absence of known exploits in the wild suggests that immediate widespread attacks are unlikely, but the vulnerability remains a significant concern for confidentiality in identity management systems globally.
Mitigation Recommendations
To mitigate CVE-2024-10451, organizations should: 1) Avoid embedding sensitive data such as passwords directly in environment variables during the Keycloak build process. Use secure vaults or secret management tools to inject secrets at runtime rather than build time. 2) Review and sanitize build pipelines to ensure no sensitive runtime values are captured or hard-coded into bytecode. 3) Monitor and audit Keycloak bytecode and configuration artifacts for embedded secrets using static analysis or secret scanning tools. 4) Upgrade to the latest Keycloak versions where this issue is addressed or patched by Red Hat once available. 5) Implement strict access controls around build environments and artifact repositories to prevent unauthorized access to potentially sensitive bytecode. 6) Employ runtime monitoring to detect unusual access patterns that may indicate attempts to extract embedded secrets. 7) Educate development and DevOps teams about the risks of hard-coded credentials and enforce best practices for secret management throughout the software development lifecycle.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-10-28T07:34:31.748Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691362a4f922b639ab5baf85
Added to database: 11/11/2025, 4:21:56 PM
Last enriched: 2/28/2026, 11:17:42 AM
Last updated: 3/23/2026, 9:31:32 PM
Views: 136
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.