A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
Workaround:
The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:4335 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4336 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:8672 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:8690 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-3501 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2358834 | issue tracking |