Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7341: Session Fixation

0
High
VulnerabilityCVE-2024-7341cvecve-2024-7341
Published: Mon Sep 09 2024 (09/09/2024, 18:51:13 UTC)
Source: CVE Database V5

Description

A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:55:21 UTC

Technical Analysis

CVE-2024-7341 is a session fixation vulnerability identified in the SAML adapters of Keycloak, an open-source identity and access management solution widely used for single sign-on (SSO) and identity federation. The vulnerability arises because the session ID and the JSESSIONID cookie are not regenerated upon user login, even when the configuration option turnOffChangeSessionIdOnLogin is enabled. This improper session management allows an attacker who can hijack or fixate a session prior to authentication to maintain control of that session after the victim logs in. The attacker can thus impersonate the victim, gaining unauthorized access to protected resources. The flaw affects Keycloak versions 0, 23.0.0, and 25.0.0, indicating it spans multiple releases. The CVSS v3.1 score of 7.1 reflects a high severity level, with attack vector being network-based, requiring low privileges and user interaction, and impacting confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments relying on Keycloak for SAML-based authentication. The issue highlights a critical failure in session fixation protection mechanisms, which are fundamental to secure authentication workflows.

Potential Impact

The impact of CVE-2024-7341 is substantial for organizations using Keycloak as their identity provider, particularly those leveraging SAML adapters for federated authentication. Successful exploitation allows attackers to hijack authenticated sessions, leading to unauthorized access to sensitive applications and data. This compromises confidentiality by exposing user data, integrity by allowing unauthorized actions under the victim's identity, and availability if attackers disrupt sessions or perform malicious activities. The vulnerability can facilitate lateral movement within networks, privilege escalation, and data breaches. Given Keycloak's widespread adoption in enterprises, government agencies, and cloud services, the threat can affect a broad range of sectors including finance, healthcare, technology, and public administration. The requirement for user interaction and low privilege reduces ease of exploitation but does not eliminate risk, especially in targeted attacks or phishing scenarios. The absence of known exploits in the wild currently limits immediate impact but organizations should act proactively.

Mitigation Recommendations

To mitigate CVE-2024-7341, organizations should prioritize updating Keycloak to versions where this vulnerability is patched once official fixes are released. In the interim, administrators should review and adjust session management configurations to ensure session IDs are regenerated upon login, overriding or disabling the turnOffChangeSessionIdOnLogin option if necessary. Implementing additional security controls such as multi-factor authentication (MFA) can reduce the risk of session hijacking. Monitoring and logging authentication events and session anomalies can help detect exploitation attempts. Network segmentation and limiting exposure of Keycloak endpoints to trusted networks reduce attack surface. Educating users about phishing and social engineering risks can prevent attackers from obtaining initial session fixation opportunities. Finally, conducting regular security assessments and penetration testing focused on authentication flows will help identify and remediate session management weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-07-31T15:13:22.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69156c928f1a6240445ae4a8

Added to database: 11/13/2025, 5:28:50 AM

Last enriched: 2/28/2026, 3:55:21 AM

Last updated: 3/25/2026, 1:45:49 PM

Views: 175

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses