A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 18 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 17 Dec 2024 23:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | keycloak: CLI option for encrypted JGroups ignored | Keycloak: cli option for encrypted jgroups ignored | 
| First Time appeared | Redhat Redhat build Keycloak Redhat jboss Enterprise Application Platform Redhat jbosseapxp | |
| CPEs | cpe:/a:redhat:build_keycloak: cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jbosseapxp | |
| Vendors & Products | Redhat Redhat build Keycloak Redhat jboss Enterprise Application Platform Redhat jbosseapxp | |
| References |  | 
Fri, 08 Nov 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information. | |
| Title | keycloak: CLI option for encrypted JGroups ignored | |
| Weaknesses | CWE-319 | |
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: redhat
Published: 2024-12-17T22:59:38.518Z
Updated: 2025-08-30T09:18:31.401Z
Reserved: 2024-11-07T16:42:52.079Z
Link: CVE-2024-10973
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-12-18T16:25:48.328Z
 NVD
                        NVD
                    Status : Received
Published: 2024-12-17T23:15:05.423
Modified: 2024-12-17T23:15:05.423
Link: CVE-2024-10973
 Redhat
                        Redhat