Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9666: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

0
Medium
VulnerabilityCVE-2024-9666cvecve-2024-9666
Published: Mon Nov 25 2024 (11/25/2024, 07:29:52 UTC)
Source: CVE Database V5

Description

A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.

AI-Powered Analysis

AILast updated: 11/11/2025, 17:18:53 UTC

Technical Analysis

CVE-2024-9666 is a denial of service vulnerability identified in the Keycloak Server, an open-source identity and access management solution widely used for authentication and authorization. The flaw arises from improper handling of proxy headers when Keycloak is configured to accept incoming proxy headers, particularly in setups where reverse proxies do not overwrite these headers. Specifically, Keycloak may accept non-IP values such as obfuscated identifiers without adequate validation. This leads to the server performing expensive DNS resolution operations on these crafted header values. An attacker with network access to the Keycloak instance can send specially crafted HTTP requests containing malicious proxy headers, causing the server to tie up IO threads during DNS lookups. This resource exhaustion can degrade service availability, resulting in denial of service. The vulnerability affects Keycloak versions from initial releases up to 25.0.0. The CVSS 3.1 base score is 4.7 (medium severity), reflecting the local attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to availability. No known exploits are currently reported in the wild. The vulnerability is particularly relevant in environments where Keycloak trusts proxy headers without additional validation or where reverse proxies fail to sanitize or overwrite incoming headers. This misconfiguration expands the attack surface, allowing attackers to exploit the vulnerability remotely within the local network or VPN. The issue does not compromise confidentiality or integrity but can cause service interruptions. Mitigation requires careful configuration of proxy headers, ensuring reverse proxies overwrite or validate headers, and monitoring for abnormal DNS resolution activity. Patch availability is not explicitly stated but should be monitored.

Potential Impact

For European organizations, the primary impact of CVE-2024-9666 is the potential for denial of service attacks against Keycloak authentication services. Keycloak is widely used in enterprise, government, and cloud environments across Europe for identity management. A successful DoS attack could disrupt user authentication workflows, leading to service outages, operational delays, and potential loss of business continuity. This is particularly critical for sectors relying on continuous access control such as finance, healthcare, and public administration. The vulnerability does not expose sensitive data or allow privilege escalation but affects availability, which can indirectly impact trust and compliance with regulations like GDPR if services become unavailable. Organizations using reverse proxies that do not sanitize proxy headers or that trust incoming headers without validation are at higher risk. The attack complexity is high, requiring specific proxy configurations and network access, which somewhat limits widespread exploitation but does not eliminate risk. Given the reliance on Keycloak in European digital infrastructures, the threat could affect national and regional identity services, cloud providers, and SaaS platforms. Disruptions could cascade to dependent services, amplifying impact. Therefore, European entities should prioritize mitigation to maintain service availability and regulatory compliance.

Mitigation Recommendations

1. Review and harden proxy configurations: Ensure that all reverse proxies in front of Keycloak instances overwrite incoming proxy headers rather than forwarding client-supplied headers unmodified. 2. Implement strict validation of proxy headers within Keycloak configurations to reject non-IP or malformed values before triggering DNS resolution. 3. Monitor DNS query logs and Keycloak IO thread usage for unusual spikes that may indicate exploitation attempts. 4. Limit network exposure of Keycloak instances by restricting access to trusted networks and VPNs to reduce attack surface. 5. Apply any available patches or updates from Keycloak maintainers promptly once released addressing this vulnerability. 6. Conduct regular security audits of proxy and Keycloak configurations to ensure compliance with best practices. 7. Consider deploying rate limiting or request filtering at the proxy level to mitigate potential DoS attempts exploiting this vulnerability. 8. Educate DevOps and security teams about the risks of trusting proxy headers without validation and the importance of secure proxy setups. These measures go beyond generic advice by focusing on proxy header handling, DNS resolution monitoring, and network access controls specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-08T22:36:23.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c4b66c7f7acdd3ea2e

Added to database: 10/4/2025, 10:15:32 AM

Last enriched: 11/11/2025, 5:18:53 PM

Last updated: 12/4/2025, 6:42:26 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats