Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-2843

Опубликовано: 12 июн. 2025
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with ClusterRole upon deployment of the Namespace-Scoped Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

Отчет

Red Hat rates this with an Important impact. Although the attacker may use a previously privileged account, the escalation may lead to broader cluster access.

Меры по смягчению последствий

Currently, no mitigation is available for this vulnerability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=2355222observability-operator: Observability Operator privilege escalation

EPSS

Процентиль: 9%
0.00032
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 месяца назад

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CVSS3: 8.8
github
около 1 месяца назад

Observability Operator is vulnerable to Incorrect Privilege Assignment through its Custom Resource MonitorStack

EPSS

Процентиль: 9%
0.00032
Низкий

8.8 High

CVSS3