Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2575: Improper Handling of Highly Compressed Data (Data Amplification) in Red Hat Red Hat build of Keycloak 26.4

0
Medium
VulnerabilityCVE-2026-2575cvecve-2026-2575
Published: Wed Mar 18 2026 (03/18/2026, 03:19:09 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service.

AI-Powered Analysis

AILast updated: 03/18/2026, 14:28:10 UTC

Technical Analysis

CVE-2026-2575 identifies a vulnerability in Red Hat's build of Keycloak version 26.4, specifically related to the handling of highly compressed SAMLRequest messages sent via the SAML Redirect Binding. The vulnerability arises because the server fails to enforce size limits during the DEFLATE decompression process of incoming SAMLRequests. An attacker can craft a maliciously compressed SAMLRequest that decompresses to a very large size, causing excessive memory consumption. This leads to an OutOfMemoryError (OOM) in the Java runtime environment, which terminates the Keycloak process, resulting in a denial of service (DoS). The attack vector requires no authentication or user interaction, making it remotely exploitable by any unauthenticated attacker with network access to the Keycloak server. The vulnerability affects the availability of the service but does not compromise confidentiality or integrity of data. The CVSS v3.1 base score is 5.3, reflecting medium severity due to the lack of impact on confidentiality and integrity, but ease of exploitation and impact on availability. No patches or exploits are currently publicly documented, but the flaw is officially published and should be addressed promptly. This vulnerability is a form of data amplification attack, where small compressed input expands to a large decompressed size, overwhelming system resources. Keycloak is widely used for identity and access management in enterprise and cloud environments, making this vulnerability relevant for organizations relying on it for authentication and authorization services.

Potential Impact

The primary impact of CVE-2026-2575 is the disruption of availability of Keycloak authentication services. Organizations relying on Keycloak 26.4 for identity and access management may experience service outages if targeted by this attack, potentially preventing users from authenticating or accessing critical applications. This can lead to operational downtime, loss of productivity, and potential cascading effects on dependent systems. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized access are not direct concerns. However, denial of service on authentication infrastructure can indirectly increase risk by forcing fallback to less secure methods or causing operational chaos. The ease of exploitation without authentication or user interaction increases the likelihood of opportunistic attacks, especially in exposed environments. Large enterprises, government agencies, and cloud service providers using Keycloak are particularly at risk. The absence of known exploits in the wild currently limits immediate impact but does not preclude future exploitation. Overall, the vulnerability poses a moderate risk to service continuity and operational stability.

Mitigation Recommendations

To mitigate CVE-2026-2575, organizations should first monitor Red Hat and Keycloak vendor advisories for official patches or updates addressing this vulnerability and apply them promptly. In the absence of patches, implement strict input validation and size limits on incoming SAMLRequests at the application or reverse proxy level to prevent processing of excessively large or suspicious payloads. Configure network-level protections such as Web Application Firewalls (WAFs) to detect and block anomalous SAMLRequest traffic patterns indicative of compression bombs or data amplification attacks. Employ resource limits and monitoring on Keycloak servers to detect and respond to abnormal memory usage spikes. Consider isolating Keycloak instances behind hardened gateways that can enforce protocol compliance and rate limiting. Regularly audit and review authentication logs for unusual activity. Additionally, ensure that Keycloak runs with appropriate Java Virtual Machine (JVM) memory settings and consider enabling JVM options that limit decompression resource consumption. Educate security teams about this vulnerability to improve detection and incident response readiness. Avoid exposing Keycloak endpoints unnecessarily to untrusted networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-16T08:39:17.943Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bab319771bdb1749a293e2

Added to database: 3/18/2026, 2:13:45 PM

Last enriched: 3/18/2026, 2:28:10 PM

Last updated: 3/19/2026, 3:21:40 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses