Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2013-4253: CWE-377 in Red Hat Openshift

0
High
VulnerabilityCVE-2013-4253cvecve-2013-4253cwe-377
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Red Hat Openshift

Description

The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.

AI-Powered Analysis

AILast updated: 07/05/2025, 02:09:33 UTC

Technical Analysis

CVE-2013-4253 is a high-severity vulnerability affecting Red Hat OpenShift version 1, specifically related to the deployment scripts found in the unsupported "OpenShift Extras" add-on scripts. The vulnerability arises because the deployment script installs a default public SSH key into the root user's authorized_keys file. This means that anyone possessing the corresponding private key can gain unauthorized root access to the affected system without authentication or user interaction. The vulnerability is classified under CWE-377, which pertains to insecure temporary file or directory permissions, but in this context, it relates to insecure handling of SSH keys leading to privilege escalation. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This indicates that an attacker can remotely exploit this vulnerability to gain root-level control, compromising system integrity without affecting confidentiality or availability. Although the vulnerability is in an unsupported add-on set and no known exploits have been reported in the wild, the presence of a default root SSH key poses a significant risk if the affected scripts are used in production environments. Since Red Hat OpenShift 1 is an older version, organizations still running this legacy platform are at risk if they have deployed the OpenShift Extras scripts without modification or removal of the default keys.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those using legacy Red Hat OpenShift 1 deployments with the OpenShift Extras scripts. Unauthorized root access can lead to full system compromise, allowing attackers to modify or delete critical data, deploy malicious software, or pivot to other internal systems. This compromises the integrity of the affected systems and can disrupt business operations. Although confidentiality is not directly impacted, the ability to alter system configurations or code can indirectly lead to data breaches or loss of trust. Given the high integrity impact and ease of exploitation without authentication or user interaction, organizations in sectors such as finance, healthcare, and critical infrastructure in Europe could face regulatory and compliance repercussions under GDPR and other data protection laws if this vulnerability is exploited. Additionally, the lack of availability impact means systems remain operational, potentially masking ongoing compromises and delaying detection.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any deployments of Red Hat OpenShift 1 that utilize the OpenShift Extras add-on scripts. Since these scripts are unsupported, organizations should consider migrating to supported, updated versions of OpenShift or alternative container orchestration platforms. If migration is not immediately feasible, organizations must manually inspect and remove any default public keys installed in the root user's authorized_keys file. Implement strict access controls and audit logging on systems running these scripts to detect unauthorized access attempts. Network-level controls such as firewall rules should restrict SSH access to trusted IP addresses only. Additionally, organizations should conduct thorough vulnerability assessments and penetration testing to verify that no unauthorized keys or backdoors exist. Finally, establish a process to monitor for unusual root login activity and integrate this monitoring with Security Information and Event Management (SIEM) systems to enable rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2013-06-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd78a2

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:09:33 AM

Last updated: 2/4/2026, 2:48:04 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats