CVE Vulnerabilities

CVE-2023-1260

Authentication Bypass Using an Alternate Path or Channel

Published: Sep 24, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions update, patch the pods/ephemeralcontainers subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
Kube-apiserverKubernetes- (including)- (including)
Red Hat OpenShift Container Platform 4.10RedHatopenshift-0:4.10.0-202308291228.p0.g26fdcdf.assembly.stream.el7*
Red Hat OpenShift Container Platform 4.11RedHatopenshift-0:4.11.0-202307200925.p0.ga9da4a8.assembly.stream.el8*
Red Hat OpenShift Container Platform 4.12RedHatopenshift-0:4.12.0-202307040929.p0.g1485cc9.assembly.stream.el9*
Red Hat OpenShift Container Platform 4.13RedHatopenshift-0:4.13.0-202307132344.p0.gf245ced.assembly.stream.el8*
Red Hat OpenShift Container Platform 4.14RedHatmicroshift-0:4.14.0-202310261440.p0.g1586504.assembly.4.14.0.el9*

Potential Mitigations

References