CVE-2023-6563
HIGHKeycloak - Memory Consumption
Title source: llmDescription
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
References (8)
Scores
CVSS v3
7.7
EPSS
0.0054
EPSS Percentile
67.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Classification
CWE
CWE-770
Status
published
Affected Products (10)
redhat/keycloak
< 21.0.0
redhat/single_sign-on
redhat/single_sign-on
redhat/openshift_container_platform
redhat/openshift_container_platform
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_ibm_linuxone
redhat/openshift_container_platform_for_ibm_linuxone
org.keycloak/keycloak-model-jpa
< 21.0.0Maven
Timeline
Published
Dec 14, 2023
Tracked Since
Feb 18, 2026