Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5967: Incorrect Default Permissions

0
Low
VulnerabilityCVE-2024-5967cvecve-2024-5967
Published: Tue Jun 18 2024 (06/18/2024, 12:05:39 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

AI-Powered Analysis

AILast updated: 11/21/2025, 07:26:03 UTC

Technical Analysis

CVE-2024-5967 is a security vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and LDAP integration. The flaw resides in the LDAP testing endpoint, which permits an administrator with the 'manage-realm' permission to modify the LDAP Connection URL without needing to re-enter the LDAP bind credentials. This behavior allows an attacker who has already gained admin-level access or compromised an admin user to redirect the Keycloak server's LDAP connection to an attacker-controlled host. When Keycloak attempts to authenticate against this malicious LDAP server, it inadvertently sends the stored LDAP bind credentials, effectively leaking sensitive domain credentials to the attacker. The vulnerability affects Keycloak versions 0, 23.0.0, and 25.0.0. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily because exploitation requires high privileges (admin access), no user interaction is needed, and the impact is limited to confidentiality leakage without direct integrity or availability compromise. No known exploits are currently reported in the wild. This vulnerability can facilitate lateral movement and domain compromise if leveraged by attackers who have already breached administrative controls. The flaw highlights the risk of improper permission and configuration management in identity management systems.

Potential Impact

For European organizations, the impact of CVE-2024-5967 can be significant despite its low CVSS score due to the sensitive nature of LDAP credentials and the critical role of Keycloak in identity management. Leakage of LDAP bind credentials can enable attackers to impersonate users, escalate privileges, and move laterally within corporate networks, potentially compromising sensitive data and critical systems. Organizations relying heavily on Keycloak for authentication and authorization, especially those integrated with Active Directory or other LDAP-based domain services, face increased risk of domain-level compromise. This is particularly concerning for sectors such as finance, government, healthcare, and critical infrastructure, where identity management is foundational to security. The requirement for admin-level access to exploit the vulnerability means that initial compromise or insider threats are prerequisites, but once exploited, the attacker gains a powerful foothold. The vulnerability could also undermine trust in federated identity systems and complicate compliance with data protection regulations like GDPR if credential leakage leads to data breaches.

Mitigation Recommendations

To mitigate CVE-2024-5967, European organizations should implement the following specific actions: 1) Restrict and tightly control admin-level permissions in Keycloak, ensuring only trusted personnel have 'manage-realm' access; 2) Monitor and audit LDAP configuration changes and access logs for unusual activity, especially changes to the Connection URL; 3) Employ network segmentation and firewall rules to limit Keycloak server outbound connections to only trusted LDAP servers, preventing connections to unauthorized hosts; 4) Use strong, unique LDAP bind credentials and consider rotating them regularly to reduce the window of exposure; 5) Apply any available patches or updates from Keycloak vendors promptly once released; 6) Conduct regular security assessments and penetration testing focusing on identity management components; 7) Implement multi-factor authentication for admin console access to reduce risk of credential compromise; 8) Consider deploying intrusion detection systems to detect anomalous LDAP traffic patterns; 9) Educate administrators on the risks of this vulnerability and best practices for secure configuration; 10) Where feasible, isolate testing endpoints or disable LDAP testing features in production environments to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-06-13T12:33:44.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69201212ce2640f942c372d4

Added to database: 11/21/2025, 7:17:38 AM

Last enriched: 11/21/2025, 7:26:03 AM

Last updated: 1/7/2026, 5:23:11 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats