<Vulnerability name="CVE-2025-12150">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2025-10-28T15:04:00</PublicDate>
    <Bugzilla id="2406192" url="https://bugzilla.redhat.com/show_bug.cgi?id=2406192" xml:lang="en:us">
org.keycloak/keycloak-services: WebAuthn Attestation Statement Verification Bypass
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>3.1</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-347</CWE>
    <Details xml:lang="en:us" source="Mitre">
A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.
    </Details>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.
    </Details>
    <Statement xml:lang="en:us">
This issue was rated Low. The vulnerability requires user interaction to manipulate the WebAuthn registration process, has high attack complexity, and limited impact, affecting only policy enforcement within the Keycloak instance. Exploitation does not compromise confidentiality or availability, and the attacker cannot bypass attestation restrictions without either intercepting the registration flow or using a rogue authenticator under user control.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Stefan Kunz (cnlab) for reporting this issue.
    </Acknowledgement>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
    </Mitigation>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.2::el9">
        <ProductName>Red Hat build of Keycloak 26.2</ProductName>
        <ReleaseDate>2025-11-25T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:22088">RHSA-2025:22088</Advisory>
        <Package name="rhbk/keycloak-operator-bundle">rhbk/keycloak-operator-bundle:26.2.11-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.2::el9">
        <ProductName>Red Hat build of Keycloak 26.2</ProductName>
        <ReleaseDate>2025-11-25T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:22088">RHSA-2025:22088</Advisory>
        <Package name="rhbk/keycloak-rhel9">rhbk/keycloak-rhel9:26.2-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.2::el9">
        <ProductName>Red Hat build of Keycloak 26.2</ProductName>
        <ReleaseDate>2025-11-25T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:22088">RHSA-2025:22088</Advisory>
        <Package name="rhbk/keycloak-rhel9-operator">rhbk/keycloak-rhel9-operator:26.2-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.2::el9">
        <ProductName>Red Hat build of Keycloak 26.2.11</ProductName>
        <ReleaseDate>2025-11-25T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:22089">RHSA-2025:22089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.4::el9">
        <ProductName>Red Hat build of Keycloak 26.4</ProductName>
        <ReleaseDate>2025-11-13T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:21371">RHSA-2025:21371</Advisory>
        <Package name="rhbk/keycloak-operator-bundle">rhbk/keycloak-operator-bundle:26.4.4-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.4::el9">
        <ProductName>Red Hat build of Keycloak 26.4</ProductName>
        <ReleaseDate>2025-11-13T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:21371">RHSA-2025:21371</Advisory>
        <Package name="rhbk/keycloak-rhel9">rhbk/keycloak-rhel9:26.4-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.4::el9">
        <ProductName>Red Hat build of Keycloak 26.4</ProductName>
        <ReleaseDate>2025-11-13T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:21371">RHSA-2025:21371</Advisory>
        <Package name="rhbk/keycloak-rhel9-operator">rhbk/keycloak-rhel9-operator:26.4-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:build_keycloak:26.4::el9">
        <ProductName>Red Hat build of Keycloak 26.4.4</ProductName>
        <ReleaseDate>2025-11-13T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2025:21370">RHSA-2025:21370</Advisory>
        <Package name="org.keycloak/keycloak-services">org.keycloak/keycloak-services</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2025-12150
https://nvd.nist.gov/vuln/detail/CVE-2025-12150
https://github.com/keycloak/keycloak/issues/43723
    </References>
</Vulnerability>