Keycloak, the popular open-source identity and access management platform, has released a critical security update to address a high-severity vulnerability that could allow low-privilege users to gain unauthorized administrative access. The vulnerability, identified as CVE-2024-3656 with a CVSS score of 8.1, was discovered by security researcher Maurizio Agazzini. It affects all Keycloak versions prior to 24.0.5, leaving these systems vulnerable if not patched. The flaw exists in specific endpoints of Keycloak’s admin REST API, where attackers with low-level privileges could execute commands intended for administrators. Exploiting this vulnerability could lead to severe security risks, including unauthorized access to sensitive information like user data, system configurations, and application secrets. Attackers could also modify critical system settings, potentially disrupting services or gaining further control of the affected infrastructure. The most critical outcome of this vulnerability is privilege escalation, allowing attackers to elevate their permissions and take full control of the Keycloak server and connected applications. This could result in widespread system compromise and significant data breaches. Keycloak has addressed the issue in version 24.0.5, and all users are strongly urged to update to the latest version to mitigate these risks.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...