First published: Mon Jan 11 2021(Updated: )
It has been found that the permissions of the /etc/kubernetes/kubeconfig on an OpenShift node are too permissive. An attacker with access to a running container which mounts /etc/kubernetes or has local access to the node, may copy this kubeconfig file and potentially attempt to add their own rogue node to the OpenShift cluster.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1914714 is high due to the potential for unauthorized access to the kubeconfig file.
To fix REDHAT-BUG-1914714, you should restrict the permissions of the /etc/kubernetes/kubeconfig file to limit access.
Users of Red Hat OpenShift are affected by REDHAT-BUG-1914714 due to the overly permissive permissions of a critical configuration file.
The potential consequences of REDHAT-BUG-1914714 include unauthorized users gaining control of the Kubernetes cluster by manipulating the kubeconfig file.
Yes, a patch is typically released in the updates for Red Hat OpenShift, so it is advisable to check for the latest updates.