Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9666: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

0
Medium
VulnerabilityCVE-2024-9666cvecve-2024-9666
Published: Mon Nov 25 2024 (11/25/2024, 07:29:52 UTC)
Source: CVE Database V5

Description

A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.

AI-Powered Analysis

AILast updated: 12/22/2025, 06:32:37 UTC

Technical Analysis

CVE-2024-9666 identifies a denial of service vulnerability in Keycloak Server, a widely used open-source identity and access management solution. The vulnerability arises from Keycloak's handling of proxy headers when configured to accept them from reverse proxies. Specifically, Keycloak may accept non-IP values such as obfuscated identifiers in proxy headers without proper validation. These malformed headers cause Keycloak to perform costly DNS resolution operations on these values, which can tie up IO threads and degrade server performance, potentially leading to denial of service. The attack vector requires the attacker to send crafted HTTP requests to a Keycloak instance that trusts proxy headers and where the reverse proxy does not overwrite these headers. The vulnerability affects versions up to 25.0.0. The CVSS 3.1 score of 4.7 reflects that the attack requires local network access (AV:L), high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported yet. This vulnerability is related to HTTP request/response smuggling concepts, where inconsistent interpretation of headers leads to security issues. The root cause is insufficient validation and sanitization of proxy headers, which are often used to convey client IP information in proxied environments. The vulnerability can be exploited to cause resource exhaustion and service disruption, impacting authentication services reliant on Keycloak.

Potential Impact

For European organizations, the impact of CVE-2024-9666 primarily concerns availability disruption of Keycloak authentication services. Keycloak is widely adopted in enterprise and public sector environments across Europe for identity federation, single sign-on, and access management. A successful DoS attack could cause authentication failures, blocking user access to critical applications and services, potentially halting business operations. This is particularly impactful for organizations relying on Keycloak for internal and external user authentication, including government agencies, financial institutions, and large enterprises. The attack requires network access to the Keycloak instance and specific proxy configurations, so exposure is limited to environments where reverse proxies do not sanitize headers properly. However, given the critical role of identity services, even temporary outages can have cascading effects on productivity and security monitoring. The vulnerability does not expose sensitive data or allow privilege escalation but can degrade service availability, which is a significant concern for compliance with European regulations on service continuity and data protection.

Mitigation Recommendations

To mitigate CVE-2024-9666, European organizations should take the following specific actions: 1) Review and harden reverse proxy configurations to ensure that incoming proxy headers are overwritten or sanitized before reaching Keycloak, preventing untrusted header values from being processed. 2) Implement strict validation of proxy headers within Keycloak or at the proxy layer to reject non-IP or malformed values, thereby avoiding costly DNS lookups. 3) Limit network exposure of Keycloak instances by restricting access to trusted networks and applying network segmentation to reduce the attack surface. 4) Monitor Keycloak server performance and logs for unusual spikes in DNS resolution or IO thread usage that could indicate exploitation attempts. 5) Stay updated with Keycloak releases and apply patches promptly once fixes for this vulnerability are available. 6) Consider deploying rate limiting or request filtering at the proxy or firewall level to mitigate potential abuse of proxy headers. 7) Conduct security reviews of the entire proxy and authentication infrastructure to ensure no other header-related vulnerabilities exist. These steps go beyond generic advice by focusing on proxy header handling and infrastructure configuration specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-08T22:36:23.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c4b66c7f7acdd3ea2e

Added to database: 10/4/2025, 10:15:32 AM

Last enriched: 12/22/2025, 6:32:37 AM

Last updated: 1/17/2026, 7:14:53 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats