CVE-2023-6563
moderate-risk
Published 2023-12-14
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Do I need to act?
-
0.54% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
NETWORK
/ LOW complexity
Affected Products (9)
Openshift Container Platform For Ibm Linuxone
Openshift Container Platform For Ibm Linuxone
Affected Vendors
References (16)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7854
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7855
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7856
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7858
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-6563
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2253308
Issue Tracking
https://github.com/keycloak/keycloak/issues/13340
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7854
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7855
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7856
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7858
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-6563
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2253308
Issue Tracking
https://github.com/keycloak/keycloak/issues/13340
44
/ 100
moderate-risk
Severity
27/34 · High
Exploitability
2/34 · Minimal
Exposure
15/34 · Moderate