First published: Tue Apr 05 2022(Updated: )
A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Advanced Cluster Management For Kubernetes | =2.0 | |
Redhat Openshift Container Platform | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3248 is a vulnerability found in OpenShift API, allowing an attacker to violate boundaries by bypassing permissions.
CVE-2022-3248 has a severity rating of 7.5 (high).
Redhat Advanced Cluster Management for Kubernetes 2.0 and Redhat Openshift Container Platform 4.0 are affected by CVE-2022-3248.
The Common Weakness Enumeration (CWE) ID for CVE-2022-3248 is CWE-863.
To fix CVE-2022-3248, it is recommended to apply the necessary patches or updates provided by Redhat.