{
  "threat_severity" : "Low",
  "public_date" : "2025-10-28T15:04:00Z",
  "bugzilla" : {
    "description" : "org.keycloak/keycloak-services: WebAuthn Attestation Statement Verification Bypass",
    "id" : "2406192",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2406192"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-347",
  "details" : [ "A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: \"none\", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.", "A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: \"none\", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration." ],
  "statement" : "This issue was rated Low. The vulnerability requires user interaction to manipulate the WebAuthn registration process, has high attack complexity, and limited impact, affecting only policy enforcement within the Keycloak instance. Exploitation does not compromise confidentiality or availability, and the attacker cannot bypass attestation restrictions without either intercepting the registration flow or using a rogue authenticator under user control.",
  "acknowledgement" : "Red Hat would like to thank Stefan Kunz (cnlab) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.2.11-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9:26.2-12"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.2-12"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2.11",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22089",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.4.4-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9:26.4-3"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.4-3"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21370",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "org.keycloak/keycloak-services"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-12150\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-12150\nhttps://github.com/keycloak/keycloak/issues/43723" ],
  "name" : "CVE-2025-12150",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}