CVE-2024-10973: Cleartext Transmission of Sensitive Information
A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.
AI Analysis
Technical Summary
CVE-2024-10973 is a vulnerability identified in Keycloak, an open-source identity and access management solution widely used for authentication and authorization services. The issue arises because the environment variable KC_CACHE_EMBEDDED_MTLS_ENABLED, which is intended to enable mutual TLS encryption for JGroups replication traffic within Keycloak clusters, does not function as expected. As a result, the JGroups replication configuration defaults to transmitting data in plaintext over the network. JGroups is a toolkit used by Keycloak for cluster communication and state replication between nodes. This cleartext transmission allows an attacker who has access to adjacent networks—networks that are logically or physically close enough to intercept traffic—to eavesdrop on sensitive information exchanged between cluster nodes. The vulnerability does not require user interaction but does require the attacker to have at least low-level privileges to access the adjacent network segment. The CVSS 3.1 base score is 5.7 (medium severity), reflecting the high confidentiality impact due to exposure of sensitive data, but no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all Keycloak versions where this environment variable is ineffective, though specific affected versions were not listed. This flaw could expose authentication tokens, session data, or other sensitive cluster state information, potentially aiding further attacks or data breaches.
Potential Impact
The primary impact of CVE-2024-10973 is the compromise of confidentiality for sensitive information transmitted between Keycloak cluster nodes. Attackers with network adjacency can intercept authentication tokens, session replication data, or other sensitive cluster state information, which could facilitate unauthorized access or lateral movement within an organization’s infrastructure. Although the vulnerability does not directly affect data integrity or system availability, the exposure of sensitive data can undermine trust in the authentication system and lead to further exploitation. Organizations relying on Keycloak for identity management in clustered deployments are at risk, especially if their network segmentation is weak or if they operate in environments where adjacent network access is possible (e.g., shared cloud infrastructure, multi-tenant data centers). This vulnerability could impact industries with high security requirements such as finance, healthcare, government, and large enterprises that use Keycloak for single sign-on and federated identity management. The lack of encryption in replication traffic also increases the risk of compliance violations related to data protection regulations.
Mitigation Recommendations
1. Monitor Keycloak vendor advisories and apply official patches or updates as soon as they become available to fix the KC_CACHE_EMBEDDED_MTLS_ENABLED functionality. 2. Restrict network access to JGroups replication ports using firewalls or network ACLs to limit exposure only to trusted cluster nodes. 3. Implement network segmentation and isolation to prevent unauthorized access to adjacent networks where JGroups traffic flows. 4. Use VPNs or IPsec tunnels to encrypt traffic between cluster nodes if native mutual TLS is not functioning. 5. Regularly audit Keycloak cluster configurations to verify that replication traffic is encrypted or otherwise protected. 6. Employ network intrusion detection systems (NIDS) to monitor for suspicious traffic patterns on JGroups ports. 7. Consider alternative clustering or caching configurations that do not rely on vulnerable JGroups settings until a patch is available. 8. Educate network and security teams about the risks of adjacent network access and enforce strict access controls in shared environments.
Affected Countries
United States, Germany, India, Brazil, Japan, United Kingdom, France, Canada, Australia, Netherlands
CVE-2024-10973: Cleartext Transmission of Sensitive Information
Description
A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-10973 is a vulnerability identified in Keycloak, an open-source identity and access management solution widely used for authentication and authorization services. The issue arises because the environment variable KC_CACHE_EMBEDDED_MTLS_ENABLED, which is intended to enable mutual TLS encryption for JGroups replication traffic within Keycloak clusters, does not function as expected. As a result, the JGroups replication configuration defaults to transmitting data in plaintext over the network. JGroups is a toolkit used by Keycloak for cluster communication and state replication between nodes. This cleartext transmission allows an attacker who has access to adjacent networks—networks that are logically or physically close enough to intercept traffic—to eavesdrop on sensitive information exchanged between cluster nodes. The vulnerability does not require user interaction but does require the attacker to have at least low-level privileges to access the adjacent network segment. The CVSS 3.1 base score is 5.7 (medium severity), reflecting the high confidentiality impact due to exposure of sensitive data, but no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all Keycloak versions where this environment variable is ineffective, though specific affected versions were not listed. This flaw could expose authentication tokens, session data, or other sensitive cluster state information, potentially aiding further attacks or data breaches.
Potential Impact
The primary impact of CVE-2024-10973 is the compromise of confidentiality for sensitive information transmitted between Keycloak cluster nodes. Attackers with network adjacency can intercept authentication tokens, session replication data, or other sensitive cluster state information, which could facilitate unauthorized access or lateral movement within an organization’s infrastructure. Although the vulnerability does not directly affect data integrity or system availability, the exposure of sensitive data can undermine trust in the authentication system and lead to further exploitation. Organizations relying on Keycloak for identity management in clustered deployments are at risk, especially if their network segmentation is weak or if they operate in environments where adjacent network access is possible (e.g., shared cloud infrastructure, multi-tenant data centers). This vulnerability could impact industries with high security requirements such as finance, healthcare, government, and large enterprises that use Keycloak for single sign-on and federated identity management. The lack of encryption in replication traffic also increases the risk of compliance violations related to data protection regulations.
Mitigation Recommendations
1. Monitor Keycloak vendor advisories and apply official patches or updates as soon as they become available to fix the KC_CACHE_EMBEDDED_MTLS_ENABLED functionality. 2. Restrict network access to JGroups replication ports using firewalls or network ACLs to limit exposure only to trusted cluster nodes. 3. Implement network segmentation and isolation to prevent unauthorized access to adjacent networks where JGroups traffic flows. 4. Use VPNs or IPsec tunnels to encrypt traffic between cluster nodes if native mutual TLS is not functioning. 5. Regularly audit Keycloak cluster configurations to verify that replication traffic is encrypted or otherwise protected. 6. Employ network intrusion detection systems (NIDS) to monitor for suspicious traffic patterns on JGroups ports. 7. Consider alternative clustering or caching configurations that do not rely on vulnerable JGroups settings until a patch is available. 8. Educate network and security teams about the risks of adjacent network access and enforce strict access controls in shared environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-11-07T16:42:52.079Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691f5c4ee672cd9080e8d4a7
Added to database: 11/20/2025, 6:22:06 PM
Last enriched: 2/28/2026, 11:23:28 AM
Last updated: 3/25/2026, 1:35:40 AM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.