CVE-2023-6563

HIGH

Keycloak - Memory Consumption

Title source: llm

Description

An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.

Scores

CVSS v3 7.7
EPSS 0.0054
EPSS Percentile 67.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Classification

CWE
CWE-770
Status published

Affected Products (10)

redhat/keycloak < 21.0.0
redhat/single_sign-on
redhat/single_sign-on
redhat/openshift_container_platform
redhat/openshift_container_platform
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_ibm_linuxone
redhat/openshift_container_platform_for_ibm_linuxone
org.keycloak/keycloak-model-jpa < 21.0.0Maven

Timeline

Published Dec 14, 2023
Tracked Since Feb 18, 2026