First published: Mon Sep 18 2023(Updated: )
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Red Hat Service Interconnect | =1.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5056 has been categorized with a significant severity due to its potential impact on the confidentiality of deployments.
To fix CVE-2023-5056, review and adjust the service account configurations in the Skupper operator to limit unauthorized access.
CVE-2023-5056 affects users of Red Hat Service Interconnect 1.0 on Red Hat Enterprise Linux 9.0.
Due to CVE-2023-5056, an authenticated attacker can view all deployments across namespaces in the cluster.
Currently, there are no official workarounds for CVE-2023-5056, and it is recommended to apply the fix as soon as available.