๐Ÿ” CVE Alert

CVE-2025-23368

HIGH 8.1

Org.wildfly.core:wildfly-elytron-integration: wildfly elytron brute force attack via cli

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.

CWE CWE-307
Published Mar 4, 2025
Last Updated Mar 10, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Build of Keycloak
All versions affected
Red Hat / Red Hat Data Grid 8
All versions affected
Red Hat / Red Hat Fuse 7
All versions affected
Red Hat / Red Hat Fuse 7
All versions affected
Red Hat / Red Hat Integration Camel K 1
All versions affected
Red Hat / Red Hat JBoss Data Grid 7
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 7
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 8
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform Expansion Pack
All versions affected
Red Hat / Red Hat Process Automation 7
All versions affected
Red Hat / Red Hat Process Automation 7
All versions affected
Red Hat / Red Hat Single Sign-On 7
All versions affected
Red Hat / Red Hat Single Sign-On 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-23368 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2337621 gruppotim.it: https://www.gruppotim.it/it/footer/red-team.html

Credits

Red Hat would like to thank Claudia Bartolini (TIM S.p.A), Marco Ventura (TIM S.p.A), and Massimiliano Brolli (TIM S.p.A) for reporting this issue.