Allocation of Resources Without Limits or Throttling Affecting org.keycloak:keycloak-quarkus-dist package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGKEYCLOAK-13517527
  • published10 Oct 2025
  • disclosed7 Oct 2025
  • creditErasure5959

Introduced: 7 Oct 2025

NewCVE-2025-11419  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via repeated client-initiated TLS renegotiation requests. An attacker can exhaust server CPU resources by sending multiple renegotiation requests over unauthenticated connections.

Note:

This issue affects only TLS 1.2 users, TLS 1.3 completely removes support for renegotiation, effectively closing this potential attack vector.

Workaround

This vulnerability can be mitigated by configuring the system to reject client-initiated TLS renegotiation using the Java system property -Djdk.tls.rejectClientInitiatedRenegotiation=true. Additionally, deploying the system behind proper network access controls and rate-limiting mechanisms can further reduce exposure.

CVSS Base Scores

version 4.0
version 3.1