Keycloak
by Redhat
Standard maintenance is sufficient
Keycloak has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
5.1%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 98 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2020-10770 | 5.3 | 92.3% | — |
| CVE-2020-27838 | 6.5 | 85.1% | — |
| CVE-2021-20323 | 6.1 | 66.1% | — |
| CVE-2023-48795 | 5.9 | 56.7% | — |
| CVE-2021-3754 | 5.3 | 12.3% | — |
| CVE-2023-0264 | 5.0 | 3.9% | — |
| CVE-2023-6134 | 4.6 | 2.5% | — |
| CVE-2020-1714 | 8.8 | 2.2% | — |
| CVE-2024-7341 | 7.1 | 1.7% | — |
| CVE-2022-4361 | 10.0 | 1.3% | — |
| CVE-2024-4629 | 6.5 | 1.1% | — |
| CVE-2019-14837 | 9.1 | 1.0% | — |
| CVE-2022-1274 | 5.4 | 0.8% | — |
| CVE-2023-6927 | 4.6 | 0.8% | — |
| CVE-2016-8627 | 4.3 | 0.8% | — |
| CVE-2019-10170 | 6.6 | 0.7% | — |
| CVE-2017-2585 | 5.9 | 0.7% | — |
| CVE-2017-2582 | 6.5 | 0.6% | — |
| CVE-2023-6841 | 7.5 | 0.6% | — |
| CVE-2019-10169 | 6.6 | 0.6% | — |
4
/ 100
low-risk
Active Threat
4/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.