CVE Vulnerabilities

CVE-2023-5408

Improper Privilege Management

Published: Nov 02, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.2 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Openshift_container_platformRedhat4.11 (including)4.11 (including)
Openshift_container_platformRedhat4.12 (including)4.12 (including)
Openshift_container_platformRedhat4.13 (including)4.13 (including)
Openshift_container_platformRedhat4.14 (including)4.14 (including)
Red Hat OpenShift Container Platform 4.11RedHatopenshift4/ose-cluster-kube-apiserver-operator:v4.11.0-202311211130.p0.g7021090.assembly.stream*
Red Hat OpenShift Container Platform 4.12RedHatopenshift4/ose-cluster-kube-apiserver-operator:v4.12.0-202311021630.p0.gfe5e2a1.assembly.stream*
Red Hat OpenShift Container Platform 4.13RedHatopenshift4/ose-cluster-kube-apiserver-operator:v4.13.0-202310210425.p0.gd525f5d.assembly.stream*
Red Hat OpenShift Container Platform 4.14RedHatopenshift4/ose-cluster-kube-apiserver-operator:v4.14.0-202310201027.p0.g8b38d12.assembly.stream*

Potential Mitigations

References