VYPR
High severityGHSA Advisory· Published Nov 25, 2024· Updated Jan 30, 2025

Keycloak mTLS Authentication Bypass via Reverse Proxy TLS Termination

CVE-2024-10039

Description

A vulnerability was found in Keycloak. Deployments of Keycloak with a reverse proxy not using pass-through termination of TLS, with mTLS enabled, are affected. This issue may allow an attacker on the local network to authenticate as any user or client that leverages mTLS as the authentication mechanism.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Keycloak deployments with mTLS and non-pass-through TLS termination allow local network attackers to bypass mTLS authentication.

Vulnerability

Overview

A vulnerability in Keycloak affects deployments that enable mutual TLS (mTLS) authentication behind a reverse proxy that terminates TLS connections without pass-through. Under this configuration, the reverse proxy handles TLS decryption before forwarding requests to Keycloak, stripping the original client certificate context. This bug allows an attacker positioned on the local network to present arbitrary client certificates, effectively impersonating any user or client that relies on mTLS for authentication [1][2].

Attack

Vector and Exploitation

The attack requires only local network access to the reverse proxy, with no privileges required and no user interaction. The attack complexity is low, as the attacker can craft or reuse certificates to bypass the intended authentication mechanism. The scope of the vulnerability changes from the reverse proxy to the Keycloak backend, enabling unauthorized access to protected resources [2].

Impact

Successful exploitation leads to complete loss of confidentiality and integrity for resources protected by mTLS. An attacker can authenticate as any mTLS-enabled user or client, gaining unauthorized access to sensitive data, performing actions on behalf of legitimate identities, and potentially escalating privileges within the Keycloak realm [1][3].

Mitigation

As of the publication date, Keycloak has not released a patch specifically for this issue. Administrators are advised to configure their reverse proxies to use pass-through TLS termination (TCP-level proxying) when mTLS is required, ensuring the client certificate is preserved for Keycloak validation. Reviewing the official advisory and monitoring for updates is recommended [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-coreMaven
< 26.0.626.0.6

Affected products

29

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.