First published: Mon Apr 24 2023(Updated: )
A flaw was found in the Open Cluster Management (OCM) when a user have access to the worker nodes which has the cluster-manager-registration-controller or cluster-manager deployments. A malicious user can take advantage of this and bind the cluster-admin to any service account or using the service account to list all secrets for all kubernetes namespaces, leading into a cluster-level privilege escalation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open Cluster Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2250 is considered a high severity vulnerability.
To fix CVE-2023-2250, ensure that user access to worker nodes is appropriately restricted and review service account permissions.
CVE-2023-2250 exploits the ability to bind cluster-admin privileges to any service account within impacted deployments.
CVE-2023-2250 affects users with access to worker nodes that are running the cluster-manager-registration-controller or cluster-manager deployments.
The impact of CVE-2023-2250 includes potential unauthorized access and control over cluster resources by malicious users.