Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7318: Use of a Key Past its Expiration Date

0
Medium
VulnerabilityCVE-2024-7318cvecve-2024-7318
Published: Mon Sep 09 2024 (09/09/2024, 18:50:36 UTC)
Source: CVE

Description

A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:18:10 UTC

Technical Analysis

CVE-2024-7318 is a vulnerability discovered in Keycloak's implementation of OTP (One-Time Password) authentication when used with FreeOTP tokens configured with the default 30-second period. Normally, OTP tokens expire after their designated period, preventing reuse. However, due to this flaw, expired OTP codes remain valid for an additional 30 seconds beyond their intended expiration, effectively doubling the token's validity window to 1 minute. This behavior means that at any given time, two OTP tokens are valid simultaneously, increasing the attack surface and the window of opportunity for attackers to reuse or intercept OTP codes to gain unauthorized access. The vulnerability affects Keycloak versions up to and including 25.0.0. The CVSS 3.1 base score is 4.8 (medium), reflecting the network attack vector with high attack complexity, no privileges required, and no user interaction needed. The impact primarily concerns confidentiality and integrity, as attackers could potentially bypass OTP protections to compromise user accounts. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed proactively. The flaw is rooted in the OTP validation logic and timing checks within Keycloak's authentication flow when interfacing with FreeOTP tokens. This issue highlights the importance of strict adherence to OTP expiration semantics to maintain strong multifactor authentication security.

Potential Impact

For European organizations, this vulnerability increases the risk of unauthorized account access through OTP reuse or interception, particularly in sectors relying heavily on Keycloak for identity and access management such as government agencies, financial institutions, and critical infrastructure operators. The extended validity period doubles the window during which an attacker can exploit stolen or intercepted OTP codes, potentially leading to account compromise, data breaches, and unauthorized transactions. While the vulnerability does not directly affect system availability, the compromise of accounts could lead to further lateral movement or privilege escalation within networks. Organizations with high-value targets or sensitive data are at increased risk, especially if they have not implemented additional layers of security such as anomaly detection or adaptive authentication. The medium severity rating reflects a moderate but non-trivial risk that should be addressed promptly to prevent exploitation.

Mitigation Recommendations

1. Monitor Keycloak vendor advisories and apply patches or updates as soon as a fix for CVE-2024-7318 is released. 2. Temporarily reduce the OTP token validity period if configurable, or adjust FreeOTP settings to minimize token overlap. 3. Implement additional authentication controls such as risk-based or adaptive authentication to detect and block suspicious login attempts. 4. Enhance monitoring and logging of authentication events to identify repeated or anomalous OTP usage patterns. 5. Educate users about the importance of securing their OTP devices and reporting suspicious activity immediately. 6. Consider deploying hardware-based OTP tokens or alternative MFA methods less susceptible to timing issues. 7. Review and tighten session management policies to limit the impact of compromised credentials. 8. Conduct regular security assessments and penetration testing focused on authentication mechanisms to identify related weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-07-31T03:04:15.355Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb7de

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 1/26/2026, 7:18:10 PM

Last updated: 2/7/2026, 11:42:14 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats