VYPR
High severityNVD Advisory· Published Aug 26, 2022· Updated Aug 3, 2024

CVE-2021-3632

CVE-2021-3632

Description

A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-coreMaven
< 15.1.015.1.0

Affected products

1

Patches

1
65480cb5a116

Prevent security flaw using passwordless authentication

https://github.com/keycloak/keycloakFlorian RitterhoffJun 12, 2021via ghsa
1 file changed · +6 0
  • services/src/main/java/org/keycloak/authentication/authenticators/browser/WebAuthnPasswordlessAuthenticatorFactory.java+6 0 modified
    @@ -53,4 +53,10 @@ public Authenticator create(KeycloakSession session) {
         public String getId() {
             return PROVIDER_ID;
         }
    +
    +    @Override
    +    public boolean isUserSetupAllowed() {
    +        return false;
    +    }
    +
     }
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.