First published: Thu Aug 08 2024(Updated: )
A vulnerability was found in OpenShift AI that allows for authentication bypass and privilege escalation across models within the same namespace. When deploying AI models, the UI provides the option to protect models with authentication. However, credentials from one model can be used to access other models and APIs within the same namespace. The exposed ServiceAccount tokens, visible in the UI, can be utilized with oc --token={token} to exploit the elevated view privileges associated with the ServiceAccount, leading to unauthorized access to additional resources.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift AI | ||
Red Hat OpenShift Data Science |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7557 has been classified as a high severity vulnerability due to its potential for authentication bypass and privilege escalation.
To remediate CVE-2024-7557, ensure that models in OpenShift AI are configured with unique authentication credentials and review access controls.
CVE-2024-7557 affects Red Hat OpenShift AI and Red Hat OpenShift Data Science implementations.
Exploiting CVE-2024-7557 may allow an unauthorized user to gain access to models and escalate privileges within the same namespace.
As of now, please check Red Hat's security advisories for updates on patches or remediation guidance for CVE-2024-7557.