Логотип exploitDog
bind:CVE-2025-2843
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2843

Количество 3

Количество 3

redhat логотип

CVE-2025-2843

7 месяцев назад

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2025-2843

около 1 месяца назад

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mj6p-p843-x5wc

около 1 месяца назад

Observability Operator is vulnerable to Incorrect Privilege Assignment through its Custom Resource MonitorStack

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-2843

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CVSS3: 8.8
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-2843

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-mj6p-p843-x5wc

Observability Operator is vulnerable to Incorrect Privilege Assignment through its Custom Resource MonitorStack

CVSS3: 8.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу