CVE-2025-3501

8.2 HIGH

📋 TL;DR

This vulnerability in Keycloak allows attackers to bypass certificate verification by setting a verification policy to 'ALL', which unintentionally skips trust store certificate validation. This affects Keycloak deployments where certificate verification is configured. Attackers could exploit this to perform man-in-the-middle attacks or impersonate trusted entities.

💻 Affected Systems

Products:
  • Keycloak
Versions: Specific affected versions not specified in references; check Red Hat advisories for exact ranges
Operating Systems: All platforms running Keycloak
Default Config Vulnerable: ✅ No
Notes: Only affects configurations where certificate verification is enabled and verification policy is set to 'ALL'

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of authentication and authorization systems, allowing attackers to impersonate users, access sensitive data, or bypass security controls through man-in-the-middle attacks.

🟠

Likely Case

Authentication bypass or privilege escalation through certificate validation failure, potentially leading to unauthorized access to protected resources.

🟢

If Mitigated

Limited impact if network segmentation and additional authentication layers are in place, though certificate validation failures could still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to modify verification policy settings, typically requiring some level of access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific Red Hat advisories for patched versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-3501

Restart Required: Yes

Instructions:

1. Review Red Hat advisories RHSA-2025:4335, RHSA-2025:4336, RHSA-2025:8672, RHSA-2025:8690. 2. Apply appropriate patches for your Keycloak version. 3. Restart Keycloak services. 4. Verify certificate verification is functioning correctly.

🔧 Temporary Workarounds

Change Verification Policy

all

Modify verification policy from 'ALL' to a more restrictive setting that enforces certificate validation

Update Keycloak configuration to use verification policy other than 'ALL'

Disable Affected Feature

all

Temporarily disable or restrict access to features using certificate verification until patched

Configure Keycloak to not use trust store certificate verification

🧯 If You Can't Patch

  • Implement network segmentation to isolate Keycloak instances from untrusted networks
  • Enable additional authentication factors and monitor for suspicious certificate validation events

🔍 How to Verify

Check if Vulnerable:

Check Keycloak configuration for verification policy set to 'ALL' and review certificate validation settings

Check Version:

Check Keycloak version via admin console or server logs

Verify Fix Applied:

Verify certificate validation is working by testing with invalid certificates and confirming they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Certificate validation failures
  • Unexpected successful authentications with invalid certificates
  • Configuration changes to verification policy

Network Indicators:

  • Unusual certificate validation traffic patterns
  • Man-in-the-middle attack signatures

SIEM Query:

Search for Keycloak authentication events with certificate validation anomalies or policy changes

🔗 References

📤 Share & Export