CVE-2024-5967: Incorrect Default Permissions
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
AI Analysis
Technical Summary
CVE-2024-5967 is a security vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and LDAP integration. The flaw resides in the LDAP testing endpoint, which permits an administrator with the 'manage-realm' permission to modify the LDAP Connection URL without needing to re-enter the LDAP bind credentials. This behavior allows an attacker who has already gained admin-level access or compromised an admin user to redirect the Keycloak server's LDAP connection to an attacker-controlled host. When Keycloak attempts to authenticate against this malicious LDAP server, it inadvertently sends the stored LDAP bind credentials, effectively leaking sensitive domain credentials to the attacker. The vulnerability affects Keycloak versions 0, 23.0.0, and 25.0.0. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily because exploitation requires high privileges (admin access), no user interaction is needed, and the impact is limited to confidentiality leakage without direct integrity or availability compromise. No known exploits are currently reported in the wild. This vulnerability can facilitate lateral movement and domain compromise if leveraged by attackers who have already breached administrative controls. The flaw highlights the risk of improper permission and configuration management in identity management systems.
Potential Impact
For European organizations, the impact of CVE-2024-5967 can be significant despite its low CVSS score due to the sensitive nature of LDAP credentials and the critical role of Keycloak in identity management. Leakage of LDAP bind credentials can enable attackers to impersonate users, escalate privileges, and move laterally within corporate networks, potentially compromising sensitive data and critical systems. Organizations relying heavily on Keycloak for authentication and authorization, especially those integrated with Active Directory or other LDAP-based domain services, face increased risk of domain-level compromise. This is particularly concerning for sectors such as finance, government, healthcare, and critical infrastructure, where identity management is foundational to security. The requirement for admin-level access to exploit the vulnerability means that initial compromise or insider threats are prerequisites, but once exploited, the attacker gains a powerful foothold. The vulnerability could also undermine trust in federated identity systems and complicate compliance with data protection regulations like GDPR if credential leakage leads to data breaches.
Mitigation Recommendations
To mitigate CVE-2024-5967, European organizations should implement the following specific actions: 1) Restrict and tightly control admin-level permissions in Keycloak, ensuring only trusted personnel have 'manage-realm' access; 2) Monitor and audit LDAP configuration changes and access logs for unusual activity, especially changes to the Connection URL; 3) Employ network segmentation and firewall rules to limit Keycloak server outbound connections to only trusted LDAP servers, preventing connections to unauthorized hosts; 4) Use strong, unique LDAP bind credentials and consider rotating them regularly to reduce the window of exposure; 5) Apply any available patches or updates from Keycloak vendors promptly once released; 6) Conduct regular security assessments and penetration testing focusing on identity management components; 7) Implement multi-factor authentication for admin console access to reduce risk of credential compromise; 8) Consider deploying intrusion detection systems to detect anomalous LDAP traffic patterns; 9) Educate administrators on the risks of this vulnerability and best practices for secure configuration; 10) Where feasible, isolate testing endpoints or disable LDAP testing features in production environments to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Finland
CVE-2024-5967: Incorrect Default Permissions
Description
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
AI-Powered Analysis
Technical Analysis
CVE-2024-5967 is a security vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and LDAP integration. The flaw resides in the LDAP testing endpoint, which permits an administrator with the 'manage-realm' permission to modify the LDAP Connection URL without needing to re-enter the LDAP bind credentials. This behavior allows an attacker who has already gained admin-level access or compromised an admin user to redirect the Keycloak server's LDAP connection to an attacker-controlled host. When Keycloak attempts to authenticate against this malicious LDAP server, it inadvertently sends the stored LDAP bind credentials, effectively leaking sensitive domain credentials to the attacker. The vulnerability affects Keycloak versions 0, 23.0.0, and 25.0.0. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily because exploitation requires high privileges (admin access), no user interaction is needed, and the impact is limited to confidentiality leakage without direct integrity or availability compromise. No known exploits are currently reported in the wild. This vulnerability can facilitate lateral movement and domain compromise if leveraged by attackers who have already breached administrative controls. The flaw highlights the risk of improper permission and configuration management in identity management systems.
Potential Impact
For European organizations, the impact of CVE-2024-5967 can be significant despite its low CVSS score due to the sensitive nature of LDAP credentials and the critical role of Keycloak in identity management. Leakage of LDAP bind credentials can enable attackers to impersonate users, escalate privileges, and move laterally within corporate networks, potentially compromising sensitive data and critical systems. Organizations relying heavily on Keycloak for authentication and authorization, especially those integrated with Active Directory or other LDAP-based domain services, face increased risk of domain-level compromise. This is particularly concerning for sectors such as finance, government, healthcare, and critical infrastructure, where identity management is foundational to security. The requirement for admin-level access to exploit the vulnerability means that initial compromise or insider threats are prerequisites, but once exploited, the attacker gains a powerful foothold. The vulnerability could also undermine trust in federated identity systems and complicate compliance with data protection regulations like GDPR if credential leakage leads to data breaches.
Mitigation Recommendations
To mitigate CVE-2024-5967, European organizations should implement the following specific actions: 1) Restrict and tightly control admin-level permissions in Keycloak, ensuring only trusted personnel have 'manage-realm' access; 2) Monitor and audit LDAP configuration changes and access logs for unusual activity, especially changes to the Connection URL; 3) Employ network segmentation and firewall rules to limit Keycloak server outbound connections to only trusted LDAP servers, preventing connections to unauthorized hosts; 4) Use strong, unique LDAP bind credentials and consider rotating them regularly to reduce the window of exposure; 5) Apply any available patches or updates from Keycloak vendors promptly once released; 6) Conduct regular security assessments and penetration testing focusing on identity management components; 7) Implement multi-factor authentication for admin console access to reduce risk of credential compromise; 8) Consider deploying intrusion detection systems to detect anomalous LDAP traffic patterns; 9) Educate administrators on the risks of this vulnerability and best practices for secure configuration; 10) Where feasible, isolate testing endpoints or disable LDAP testing features in production environments to reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-06-13T12:33:44.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69201212ce2640f942c372d4
Added to database: 11/21/2025, 7:17:38 AM
Last enriched: 11/21/2025, 7:26:03 AM
Last updated: 1/7/2026, 4:48:29 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.