Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5187

Опубликовано: 12 авг. 2025
Источник: redhat
CVSS3: 6.7
EPSS Низкий

Описание

A vulnerability exists in the NodeRestriction admission controller in Kubernetes clusters where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection.

A vulnerability was found in the kube-apiserver's NodeRestriction admission controller, where node users can delete their corresponding node object by setting their own OwnerReference to a cluster-scoped resource. This flaw allows an attacker to delete and recreate its node object, leading to the node being recreated with modified taints or labels, which should not be allowed in this context. This may let the attacker control which pods are running on the compromised node.

Отчет

This vulnerability is rated as having a Moderate severity. For a successful attack to take place, the attacker needs to have a high privileged account with enough privileges to create the nodes.

Меры по смягчению последствий

This vulnerability can be mitigated by enabling the OwnerReferencesPermissionEnforcement admission controller, which will prevent any user without delete permissions on an object from modifying the OwnerReferences on that object. Note that this admission controller will apply to all users and object types.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshiftAffected
Red Hat OpenShift Container Platform 4openshift4/ose-hyperkube-rhel9Affected
Red Hat OpenShift Container Platform 4openshift4/ose-kube-proxyAffected
Red Hat OpenShift Container Platform 4ose-installer-kube-apiserver-artifacts-containerAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=2375801kubernetes: kube-apiserver: Nodes can delete themselves by adding an OwnerReference

EPSS

Процентиль: 4%
0.00021
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller in Kubernetes clusters where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection.

CVSS3: 6.7
nvd
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller in Kubernetes clusters where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection.

CVSS3: 6.7
debian
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller in ...

CVSS3: 6.7
github
2 месяца назад

Kubernetes Nodes can delete themselves by adding an OwnerReference

CVSS3: 6.7
fstec
3 месяца назад

Уязвимость плагина NodeRestriction сервера kube-apiserver программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 4%
0.00021
Низкий

6.7 Medium

CVSS3