Lucene search

K
cve[email protected]CVE-2022-3248
HistoryOct 05, 2023 - 2:15 p.m.

CVE-2022-3248

2023-10-0514:15:09
CWE-863
web.nvd.nist.gov
34
cve-2022-3248
openshift api
admission checks
permissions
security vulnerability
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

18.0%

A flaw was found in OpenShift API, as admission checks do not enforce “custom-host” permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.

Affected configurations

NVD
Node
redhatadvanced_cluster_management_for_kubernetesMatch2.0
OR
redhatopenshift_container_platformMatch4.0

CNA Affected

[
  {
    "product": "kubernetes",
    "vendor": "n/a",
    "defaultStatus": "affected"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Management for Kubernetes 2",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "rhacm2/agent-service-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:acm:2"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Ansible Automation Platform 1.2",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "kubernetes",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:ansible_automation_platform"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Ansible Tower 3",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "kubernetes",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:ansible_tower:3"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 3.11",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "atomic-openshift",
    "defaultStatus": "unknown",
    "cpes": [
      "cpe:/a:redhat:openshift:3.11"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openshift",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openshift:4"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openshift-clients",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openshift:4"
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

18.0%

Related for CVE-2022-3248