We found results for “”
CVE-2025-11419
Good to know:
Date: December 23, 2025
A flaw was found in Keycloak. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) by repeatedly initiating TLS 1.2 client-initiated renegotiation requests to exhaust server CPU resources, making the service unavailable.
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version org.keycloak:keycloak-quarkus-dist:26.0.16;org.keycloak:keycloak-quarkus-dist:26.2.10;org.keycloak:keycloak-quarkus-dist:26.4.1;https://github.com/keycloak/keycloak.git - 26.0.16;https://github.com/keycloak/keycloak.git - 26.2.10;https://github.com/keycloak/keycloak.git - 26.4.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


