CVE-2024-9666: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.
AI Analysis
Technical Summary
CVE-2024-9666 is a denial of service vulnerability affecting Keycloak Server versions up to 25.0.0. The issue arises from inconsistent interpretation and improper validation of proxy headers when Keycloak is configured to accept and trust these headers, typically in environments behind reverse proxies. Specifically, Keycloak may accept non-IP values in proxy headers, such as obfuscated or malformed identifiers, without proper validation. This leads to costly DNS resolution attempts for these invalid values. An attacker can exploit this by sending specially crafted HTTP requests containing such proxy headers, causing the server to perform excessive DNS lookups. This behavior ties up IO threads and resources, resulting in denial of service conditions. The vulnerability requires that the attacker has network access to send requests to the Keycloak instance and that the reverse proxy does not overwrite incoming headers, allowing malicious headers to reach Keycloak. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS 3.1 score of 4.7 reflects a local attack vector with high attack complexity and low privileges, no user interaction, and an impact limited to availability. No public exploits have been reported yet. This vulnerability highlights the risks of trusting proxy headers without strict validation and the importance of secure proxy configurations in identity management systems.
Potential Impact
The primary impact of CVE-2024-9666 is denial of service, which can disrupt authentication and authorization services provided by Keycloak. Organizations relying on Keycloak for identity and access management may experience service outages or degraded performance, affecting user access to critical applications and services. This can lead to operational disruptions, loss of productivity, and potential cascading effects on dependent systems. Since Keycloak is widely used in enterprise environments, cloud services, and open-source projects, the vulnerability could affect a broad range of organizations globally. The attack requires network access and specific proxy configurations, limiting the scope somewhat, but misconfigured environments are common. The denial of service could be leveraged as part of a larger attack chain or to cause targeted disruption against specific organizations. The lack of impact on confidentiality and integrity reduces risks of data breaches but availability impacts can still be severe for business continuity.
Mitigation Recommendations
To mitigate CVE-2024-9666, organizations should: 1) Review and harden proxy configurations to ensure that reverse proxies overwrite or sanitize incoming proxy headers before forwarding requests to Keycloak. 2) Disable trusting of proxy headers in Keycloak unless absolutely necessary, or restrict trusted proxies explicitly. 3) Implement strict validation of proxy headers to reject non-IP or malformed values before processing. 4) Monitor Keycloak server logs and network traffic for unusual DNS resolution patterns or spikes in IO thread usage indicative of exploitation attempts. 5) Apply any available patches or updates from Keycloak vendors as soon as they are released. 6) Consider deploying rate limiting or request filtering at the proxy or firewall level to reduce the risk of abuse. 7) Conduct regular security reviews of identity management infrastructure, especially when using reverse proxies and header forwarding. These steps go beyond generic advice by focusing on proxy header validation and infrastructure configuration, which are the root causes of this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Canada, Australia, Netherlands, Brazil
CVE-2024-9666: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Description
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.
AI-Powered Analysis
Technical Analysis
CVE-2024-9666 is a denial of service vulnerability affecting Keycloak Server versions up to 25.0.0. The issue arises from inconsistent interpretation and improper validation of proxy headers when Keycloak is configured to accept and trust these headers, typically in environments behind reverse proxies. Specifically, Keycloak may accept non-IP values in proxy headers, such as obfuscated or malformed identifiers, without proper validation. This leads to costly DNS resolution attempts for these invalid values. An attacker can exploit this by sending specially crafted HTTP requests containing such proxy headers, causing the server to perform excessive DNS lookups. This behavior ties up IO threads and resources, resulting in denial of service conditions. The vulnerability requires that the attacker has network access to send requests to the Keycloak instance and that the reverse proxy does not overwrite incoming headers, allowing malicious headers to reach Keycloak. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS 3.1 score of 4.7 reflects a local attack vector with high attack complexity and low privileges, no user interaction, and an impact limited to availability. No public exploits have been reported yet. This vulnerability highlights the risks of trusting proxy headers without strict validation and the importance of secure proxy configurations in identity management systems.
Potential Impact
The primary impact of CVE-2024-9666 is denial of service, which can disrupt authentication and authorization services provided by Keycloak. Organizations relying on Keycloak for identity and access management may experience service outages or degraded performance, affecting user access to critical applications and services. This can lead to operational disruptions, loss of productivity, and potential cascading effects on dependent systems. Since Keycloak is widely used in enterprise environments, cloud services, and open-source projects, the vulnerability could affect a broad range of organizations globally. The attack requires network access and specific proxy configurations, limiting the scope somewhat, but misconfigured environments are common. The denial of service could be leveraged as part of a larger attack chain or to cause targeted disruption against specific organizations. The lack of impact on confidentiality and integrity reduces risks of data breaches but availability impacts can still be severe for business continuity.
Mitigation Recommendations
To mitigate CVE-2024-9666, organizations should: 1) Review and harden proxy configurations to ensure that reverse proxies overwrite or sanitize incoming proxy headers before forwarding requests to Keycloak. 2) Disable trusting of proxy headers in Keycloak unless absolutely necessary, or restrict trusted proxies explicitly. 3) Implement strict validation of proxy headers to reject non-IP or malformed values before processing. 4) Monitor Keycloak server logs and network traffic for unusual DNS resolution patterns or spikes in IO thread usage indicative of exploitation attempts. 5) Apply any available patches or updates from Keycloak vendors as soon as they are released. 6) Consider deploying rate limiting or request filtering at the proxy or firewall level to reduce the risk of abuse. 7) Conduct regular security reviews of identity management infrastructure, especially when using reverse proxies and header forwarding. These steps go beyond generic advice by focusing on proxy header validation and infrastructure configuration, which are the root causes of this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-10-08T22:36:23.598Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0f3c4b66c7f7acdd3ea2e
Added to database: 10/4/2025, 10:15:32 AM
Last enriched: 2/27/2026, 5:17:48 PM
Last updated: 3/5/2026, 10:30:14 AM
Views: 126
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1605: CWE-400 Uncontrolled Resource Consumption in Eclipse Foundation Eclipse Jetty
HighCVE-2026-21628: CWE-434 Unrestricted Upload of File with Dangerous Type in astroidframe.work Astroid Template Framework
CriticalCVE-2025-11143: CWE-20 Improper Input Validation in Eclipse Foundation Eclipse Jetty
LowCVE-2026-28551: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
MediumCVE-2026-28548: CWE-269 Improper Privilege Management in Huawei HarmonyOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.