Skip to main content

CVE-2013-4253: CWE-377 in Red Hat Openshift

High
VulnerabilityCVE-2013-4253cvecve-2013-4253cwe-377
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Red Hat Openshift

Description

The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.

AI-Powered Analysis

AILast updated: 07/05/2025, 02:09:33 UTC

Technical Analysis

CVE-2013-4253 is a high-severity vulnerability affecting Red Hat OpenShift version 1, specifically related to the deployment scripts found in the unsupported "OpenShift Extras" add-on scripts. The vulnerability arises because the deployment script installs a default public SSH key into the root user's authorized_keys file. This means that anyone possessing the corresponding private key can gain unauthorized root access to the affected system without authentication or user interaction. The vulnerability is classified under CWE-377, which pertains to insecure temporary file or directory permissions, but in this context, it relates to insecure handling of SSH keys leading to privilege escalation. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This indicates that an attacker can remotely exploit this vulnerability to gain root-level control, compromising system integrity without affecting confidentiality or availability. Although the vulnerability is in an unsupported add-on set and no known exploits have been reported in the wild, the presence of a default root SSH key poses a significant risk if the affected scripts are used in production environments. Since Red Hat OpenShift 1 is an older version, organizations still running this legacy platform are at risk if they have deployed the OpenShift Extras scripts without modification or removal of the default keys.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those using legacy Red Hat OpenShift 1 deployments with the OpenShift Extras scripts. Unauthorized root access can lead to full system compromise, allowing attackers to modify or delete critical data, deploy malicious software, or pivot to other internal systems. This compromises the integrity of the affected systems and can disrupt business operations. Although confidentiality is not directly impacted, the ability to alter system configurations or code can indirectly lead to data breaches or loss of trust. Given the high integrity impact and ease of exploitation without authentication or user interaction, organizations in sectors such as finance, healthcare, and critical infrastructure in Europe could face regulatory and compliance repercussions under GDPR and other data protection laws if this vulnerability is exploited. Additionally, the lack of availability impact means systems remain operational, potentially masking ongoing compromises and delaying detection.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any deployments of Red Hat OpenShift 1 that utilize the OpenShift Extras add-on scripts. Since these scripts are unsupported, organizations should consider migrating to supported, updated versions of OpenShift or alternative container orchestration platforms. If migration is not immediately feasible, organizations must manually inspect and remove any default public keys installed in the root user's authorized_keys file. Implement strict access controls and audit logging on systems running these scripts to detect unauthorized access attempts. Network-level controls such as firewall rules should restrict SSH access to trusted IP addresses only. Additionally, organizations should conduct thorough vulnerability assessments and penetration testing to verify that no unauthorized keys or backdoors exist. Finally, establish a process to monitor for unusual root login activity and integrate this monitoring with Security Information and Event Management (SIEM) systems to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2013-06-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd78a2

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:09:33 AM

Last updated: 7/31/2025, 10:59:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats