CVE-2023-6563: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat Single Sign-On 7.6 for RHEL 7
CVE-2023-6563 is a high-severity vulnerability in Red Hat Single Sign-On (RH-SSO) 7. 6 for RHEL 7, caused by unconstrained memory consumption when loading offline client sessions in the admin UI. It occurs in environments with millions of offline tokens, where opening the 'consents' tab with multiple user sessions causes excessive memory and CPU usage, potentially crashing the system. Exploitation requires authenticated access with at least two user sessions and no user interaction beyond accessing the admin UI. The vulnerability impacts availability but not confidentiality or integrity. There are no known exploits in the wild yet. European organizations using RH-SSO at scale, especially in sectors with large user bases, are at risk. Mitigation involves limiting offline token counts, monitoring resource usage, and applying vendor patches once available. Countries with significant Red Hat enterprise deployments and critical infrastructure relying on RH-SSO are most likely affected.
AI Analysis
Technical Summary
CVE-2023-6563 is a resource exhaustion vulnerability identified in Red Hat Single Sign-On (RH-SSO) version 7.6 running on Red Hat Enterprise Linux 7. The root cause lies in the Keycloak component used by RH-SSO, specifically when handling offline client sessions in the administrative user interface. In large-scale deployments with millions of offline tokens—typically environments supporting over 500,000 users each maintaining multiple saved sessions—an attacker who can authenticate and create two or more user sessions can trigger the vulnerability by opening the 'consents' tab in the admin UI. This action causes the system to attempt loading an extremely large number of offline client sessions without any throttling or limits on resource allocation. Consequently, the server experiences excessive memory and CPU consumption, which can lead to a denial-of-service (DoS) condition by crashing or severely degrading the availability of the RH-SSO service. The vulnerability does not impact confidentiality or integrity, as it requires authenticated access and does not allow data manipulation or leakage. The CVSS v3.1 score is 7.7, reflecting high severity due to network attack vector, low attack complexity, required privileges, no user interaction, and impact limited to availability with scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to large-scale identity management deployments relying on RH-SSO 7.6 on RHEL 7.
Potential Impact
For European organizations, especially those operating large-scale identity and access management infrastructures using Red Hat Single Sign-On 7.6 on RHEL 7, this vulnerability presents a critical availability risk. Organizations with extensive user bases—such as government agencies, financial institutions, telecommunications providers, and large enterprises—may have millions of offline tokens and multiple user sessions, making them susceptible to resource exhaustion attacks. A successful exploitation could lead to denial of service, disrupting authentication services and potentially halting access to critical applications and services dependent on RH-SSO. This could result in operational downtime, loss of productivity, and damage to reputation. Additionally, the cascading effects of authentication service outages could impact compliance with regulatory requirements such as GDPR, especially if service interruptions affect user data access controls. While no confidentiality or integrity breaches are indicated, the availability impact alone can have severe consequences for business continuity and security posture.
Mitigation Recommendations
To mitigate CVE-2023-6563, organizations should first monitor and audit the number of offline tokens and user sessions maintained in their RH-SSO deployments, aiming to limit the total count to manageable levels below the millions threshold. Implementing session and token lifecycle management policies to regularly expire and clean up stale offline tokens can reduce risk. Administrators should restrict access to the RH-SSO admin UI, especially the 'consents' tab, to trusted personnel and consider network segmentation or VPN access controls to limit exposure. Applying any official patches or updates from Red Hat as soon as they become available is critical. In the interim, organizations can implement resource usage monitoring and alerting on RH-SSO servers to detect abnormal memory or CPU spikes. Additionally, consider deploying rate limiting or throttling mechanisms at the application or infrastructure level to prevent excessive resource consumption triggered by UI actions. Finally, review and harden authentication and authorization policies to minimize the number of concurrent sessions per user and enforce strong session management practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2023-6563: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat Single Sign-On 7.6 for RHEL 7
Description
CVE-2023-6563 is a high-severity vulnerability in Red Hat Single Sign-On (RH-SSO) 7. 6 for RHEL 7, caused by unconstrained memory consumption when loading offline client sessions in the admin UI. It occurs in environments with millions of offline tokens, where opening the 'consents' tab with multiple user sessions causes excessive memory and CPU usage, potentially crashing the system. Exploitation requires authenticated access with at least two user sessions and no user interaction beyond accessing the admin UI. The vulnerability impacts availability but not confidentiality or integrity. There are no known exploits in the wild yet. European organizations using RH-SSO at scale, especially in sectors with large user bases, are at risk. Mitigation involves limiting offline token counts, monitoring resource usage, and applying vendor patches once available. Countries with significant Red Hat enterprise deployments and critical infrastructure relying on RH-SSO are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2023-6563 is a resource exhaustion vulnerability identified in Red Hat Single Sign-On (RH-SSO) version 7.6 running on Red Hat Enterprise Linux 7. The root cause lies in the Keycloak component used by RH-SSO, specifically when handling offline client sessions in the administrative user interface. In large-scale deployments with millions of offline tokens—typically environments supporting over 500,000 users each maintaining multiple saved sessions—an attacker who can authenticate and create two or more user sessions can trigger the vulnerability by opening the 'consents' tab in the admin UI. This action causes the system to attempt loading an extremely large number of offline client sessions without any throttling or limits on resource allocation. Consequently, the server experiences excessive memory and CPU consumption, which can lead to a denial-of-service (DoS) condition by crashing or severely degrading the availability of the RH-SSO service. The vulnerability does not impact confidentiality or integrity, as it requires authenticated access and does not allow data manipulation or leakage. The CVSS v3.1 score is 7.7, reflecting high severity due to network attack vector, low attack complexity, required privileges, no user interaction, and impact limited to availability with scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to large-scale identity management deployments relying on RH-SSO 7.6 on RHEL 7.
Potential Impact
For European organizations, especially those operating large-scale identity and access management infrastructures using Red Hat Single Sign-On 7.6 on RHEL 7, this vulnerability presents a critical availability risk. Organizations with extensive user bases—such as government agencies, financial institutions, telecommunications providers, and large enterprises—may have millions of offline tokens and multiple user sessions, making them susceptible to resource exhaustion attacks. A successful exploitation could lead to denial of service, disrupting authentication services and potentially halting access to critical applications and services dependent on RH-SSO. This could result in operational downtime, loss of productivity, and damage to reputation. Additionally, the cascading effects of authentication service outages could impact compliance with regulatory requirements such as GDPR, especially if service interruptions affect user data access controls. While no confidentiality or integrity breaches are indicated, the availability impact alone can have severe consequences for business continuity and security posture.
Mitigation Recommendations
To mitigate CVE-2023-6563, organizations should first monitor and audit the number of offline tokens and user sessions maintained in their RH-SSO deployments, aiming to limit the total count to manageable levels below the millions threshold. Implementing session and token lifecycle management policies to regularly expire and clean up stale offline tokens can reduce risk. Administrators should restrict access to the RH-SSO admin UI, especially the 'consents' tab, to trusted personnel and consider network segmentation or VPN access controls to limit exposure. Applying any official patches or updates from Red Hat as soon as they become available is critical. In the interim, organizations can implement resource usage monitoring and alerting on RH-SSO servers to detect abnormal memory or CPU spikes. Additionally, consider deploying rate limiting or throttling mechanisms at the application or infrastructure level to prevent excessive resource consumption triggered by UI actions. Finally, review and harden authentication and authorization policies to minimize the number of concurrent sessions per user and enforce strong session management practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-12-06T18:47:35.594Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e7a23aba0e608b4f980f67
Added to database: 10/9/2025, 11:53:30 AM
Last enriched: 10/9/2025, 12:07:55 PM
Last updated: 10/9/2025, 3:50:33 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.