CVE-2023-5056: Missing Authorization in Red Hat Service Interconnect 1 for RHEL 9
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
AI Analysis
Technical Summary
CVE-2023-5056 is a vulnerability identified in the Skupper operator component of Red Hat Service Interconnect 1 for RHEL 9. The flaw arises from missing authorization controls that allow an authenticated attacker located in an adjacent cluster to exploit a specific configuration to create a service account. This service account grants the attacker the ability to view deployment information across all namespaces within the targeted cluster, effectively bypassing intended access controls and namespace isolation. The vulnerability does not allow modification or disruption of deployments but compromises confidentiality by exposing potentially sensitive deployment metadata and configurations. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack requires adjacent network access and low complexity, with the attacker having low privileges but no user interaction needed. The scope is changed, meaning the vulnerability affects resources beyond the attacker’s initial privileges. Although no known exploits have been reported in the wild, the vulnerability poses a risk in multi-tenant or interconnected cluster environments where lateral movement or information gathering could facilitate further attacks. The issue is specific to Red Hat’s implementation of Service Interconnect 1 on RHEL 9, which is used to enable secure communication between Kubernetes clusters, often in hybrid or multi-cloud deployments.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of deployment information across Kubernetes namespaces, which can reveal sensitive operational details, configuration data, and potentially expose attack surface information. This can facilitate reconnaissance activities for further targeted attacks, including privilege escalation or lateral movement within cloud-native environments. Organizations relying on Red Hat Service Interconnect 1 for RHEL 9 in multi-cluster setups, especially in critical sectors such as finance, energy, telecommunications, and government, face increased risk. The confidentiality breach could lead to compliance violations under GDPR if personal or sensitive data configurations are exposed. While the vulnerability does not allow direct modification or denial of service, the information leakage could indirectly lead to more severe compromises. The medium severity rating reflects the balance between the ease of exploitation and the limited scope of impact to confidentiality only.
Mitigation Recommendations
Organizations should immediately review their Red Hat Service Interconnect 1 deployments on RHEL 9 and apply any available patches or updates from Red Hat once released. In the absence of patches, administrators should audit and restrict configurations that allow creation of service accounts by adjacent clusters, enforcing strict role-based access controls (RBAC) and network segmentation between clusters. Monitoring and logging of service account creation and cross-cluster access attempts should be enhanced to detect suspicious activity. Additionally, organizations should implement the principle of least privilege for all service accounts and regularly review cluster federation and interconnect policies to ensure no excessive permissions are granted. Network-level controls such as firewall rules or Kubernetes network policies should limit adjacency and communication between clusters to trusted entities only. Finally, security teams should incorporate this vulnerability into their threat modeling and incident response plans to quickly address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2023-5056: Missing Authorization in Red Hat Service Interconnect 1 for RHEL 9
Description
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
AI-Powered Analysis
Technical Analysis
CVE-2023-5056 is a vulnerability identified in the Skupper operator component of Red Hat Service Interconnect 1 for RHEL 9. The flaw arises from missing authorization controls that allow an authenticated attacker located in an adjacent cluster to exploit a specific configuration to create a service account. This service account grants the attacker the ability to view deployment information across all namespaces within the targeted cluster, effectively bypassing intended access controls and namespace isolation. The vulnerability does not allow modification or disruption of deployments but compromises confidentiality by exposing potentially sensitive deployment metadata and configurations. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack requires adjacent network access and low complexity, with the attacker having low privileges but no user interaction needed. The scope is changed, meaning the vulnerability affects resources beyond the attacker’s initial privileges. Although no known exploits have been reported in the wild, the vulnerability poses a risk in multi-tenant or interconnected cluster environments where lateral movement or information gathering could facilitate further attacks. The issue is specific to Red Hat’s implementation of Service Interconnect 1 on RHEL 9, which is used to enable secure communication between Kubernetes clusters, often in hybrid or multi-cloud deployments.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of deployment information across Kubernetes namespaces, which can reveal sensitive operational details, configuration data, and potentially expose attack surface information. This can facilitate reconnaissance activities for further targeted attacks, including privilege escalation or lateral movement within cloud-native environments. Organizations relying on Red Hat Service Interconnect 1 for RHEL 9 in multi-cluster setups, especially in critical sectors such as finance, energy, telecommunications, and government, face increased risk. The confidentiality breach could lead to compliance violations under GDPR if personal or sensitive data configurations are exposed. While the vulnerability does not allow direct modification or denial of service, the information leakage could indirectly lead to more severe compromises. The medium severity rating reflects the balance between the ease of exploitation and the limited scope of impact to confidentiality only.
Mitigation Recommendations
Organizations should immediately review their Red Hat Service Interconnect 1 deployments on RHEL 9 and apply any available patches or updates from Red Hat once released. In the absence of patches, administrators should audit and restrict configurations that allow creation of service accounts by adjacent clusters, enforcing strict role-based access controls (RBAC) and network segmentation between clusters. Monitoring and logging of service account creation and cross-cluster access attempts should be enhanced to detect suspicious activity. Additionally, organizations should implement the principle of least privilege for all service accounts and regularly review cluster federation and interconnect policies to ensure no excessive permissions are granted. Network-level controls such as firewall rules or Kubernetes network policies should limit adjacency and communication between clusters to trusted entities only. Finally, security teams should incorporate this vulnerability into their threat modeling and incident response plans to quickly address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-09-18T18:33:13.584Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e7a23aba0e608b4f980f71
Added to database: 10/9/2025, 11:53:30 AM
Last enriched: 11/20/2025, 7:56:41 AM
Last updated: 12/2/2025, 8:59:50 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.