CVE-2023-6563
Java vulnerability analysis and mitigation

Overview

An unconstrained memory consumption vulnerability (CVE-2023-6563) was discovered in Keycloak, affecting versions up to (excluding) 21.0.0. The vulnerability was disclosed on December 14, 2023, impacting Red Hat Single Sign-On and Keycloak installations. This security issue affects environments with large numbers of offline tokens, specifically those with more than 500,000 users having at least 2 saved sessions (NVD, Red Hat Bugzilla).

Technical details

The vulnerability is classified as an Allocation of Resources Without Limits or Throttling (CWE-770) with a CVSS v3.1 base score of 7.7 (HIGH). The issue occurs when an attacker creates two or more user sessions and then accesses the 'consents' tab of the admin User Interface. This action triggers the UI to attempt loading a huge number of offline client sessions, leading to excessive memory and CPU consumption (NVD, GitHub Issue).

Impact

When exploited, this vulnerability can potentially crash the entire system due to excessive memory and CPU consumption. The impact is particularly severe in environments with millions of offline tokens, where the system attempts to process an overwhelming number of client sessions simultaneously (NVD).

Mitigation and workarounds

Red Hat has released security updates to address this vulnerability across multiple platforms. Updates are available for Red Hat Single Sign-On 7.6.6 for RHEL 7, 8, and 9, as well as OpenShift Container Platform versions. Users are advised to update to the latest version of Keycloak (21.0.0) or apply the appropriate security patches (Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2026-1002MEDIUM6.9
  • JavaJava
  • pki-resteasy-client
NoYesJan 15, 2026
CVE-2025-66169MEDIUM5.3
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026
CVE-2026-0976LOW3.7
  • JavaJava
  • keycloak
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management