CVE-2023-6563

An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
redhatCNA
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
redhatkeycloak
𝑥
< 21.0.0
redhatsingle_sign-on
7.6
redhatsingle_sign-on
-
redhatopenshift_container_platform
4.11
redhatopenshift_container_platform
4.12
redhatopenshift_container_platform_for_power
4.9
redhatopenshift_container_platform_for_power
4.10
redhatopenshift_container_platform_for_ibm_linuxone
4.9
redhatopenshift_container_platform_for_ibm_linuxone
4.10
𝑥
= Vulnerable software versions