Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4563

Опубликовано: 19 июн. 2025
Источник: redhat
CVSS3: 2.7
EPSS Низкий

Описание

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

A flaw was found in the Kubernetes NodeRestriction admission controller when the DynamicResourceAllocation feature is enabled. While this controller properly validates resource claims during pod status updates, it fails to apply the same validation during pod creation. This oversight allows a compromised node to create mirror pods that can access unauthorized dynamic resources, potentially leading to unauthorized data access and privilege escalation. Although kubelet sanity checks usually prevent such pods from running, the lack of authorization enforcement at creation time poses a real security policy failure.

Отчет

Red Hat Product Security has assessed the severity of this vulnerability as Low due to its limited preconditions and mitigated runtime impact. While successful exploitation requires a compromised node, the vulnerability enables that node to bypass API authorization checks and gain access to unauthorized dynamic resources. This represents a serious policy enforcement gap. Although kubelet checks often prevent affected pods from running, the underlying flaw allows violation of Kubernetes’ access control boundaries.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshiftFix deferred
Red Hat OpenShift Container Platform 4openshift4/ose-hyperkubeNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-hyperkube-rhel9Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-kube-proxyNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-kube-proxy-rhel9Not affected
Red Hat OpenShift Container Platform 4ose-installer-kube-apiserver-artifacts-containerNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=2373839kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass

EPSS

Процентиль: 5%
0.00024
Низкий

2.7 Low

CVSS3

Связанные уязвимости

CVSS3: 2.7
ubuntu
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS3: 2.7
nvd
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS3: 2.7
debian
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller whe ...

CVSS3: 2.7
github
2 месяца назад

kubernetes allows nodes to bypass dynamic resource allocation authorization checks

EPSS

Процентиль: 5%
0.00024
Низкий

2.7 Low

CVSS3