Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-228
Version:
1.1
Affected software:
Keycloak
Type:
Privilege escalation and impersonation
CVE/CVSS:
CVE-2024-8698
CVSS: 7.7 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L)
CVE-2024-8698 is a privilege escalation and impersonation vulnerability located in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element.
Successful exploitation of this vulnerability would enable attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Keycloak reports this vulnerability is addressed in version 25.0.6.
As Keycloak is a component in multiple products, it is recommended to also implement the updates from other vendors who rely on Keycloak for identity and access management.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via:https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.