Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5408: Improper Privilege Management in Red Hat Red Hat OpenShift Container Platform 4.11

0
High
VulnerabilityCVE-2023-5408cvecve-2023-5408
Published: Thu Nov 02 2023 (11/02/2023, 02:55:58 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.11

Description

A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

AI-Powered Analysis

AILast updated: 11/07/2025, 10:52:40 UTC

Technical Analysis

CVE-2023-5408 is a vulnerability identified in the node restriction admission plugin of the Kubernetes API server component within Red Hat OpenShift Container Platform version 4.11. The node restriction admission plugin is responsible for enforcing policies that restrict nodes from modifying certain resources or labels that could affect workload scheduling and cluster security. The flaw allows a remote attacker who has the capability to modify the node role label to manipulate workload placement by steering workloads originally intended for control plane and etcd nodes onto different worker nodes. This misplacement can lead to privilege escalation because workloads running on control plane or etcd nodes typically have elevated privileges and access to sensitive cluster components. By redirecting workloads, the attacker can gain broader access to the cluster, potentially compromising confidentiality, integrity, and availability of cluster resources. The vulnerability requires the attacker to have some level of privileges (PR:H) but does not require user interaction (UI:N), and it can be exploited remotely (AV:N). The CVSS v3.1 base score is 7.2, indicating a high severity due to the combination of high impact on confidentiality, integrity, and availability, and relatively low attack complexity. No known exploits have been reported in the wild as of the published date. The vulnerability highlights the importance of strict control over node labels and workload scheduling policies within Kubernetes clusters, especially in enterprise-grade container platforms like OpenShift. Organizations should monitor and restrict changes to node role labels and ensure that workloads are only scheduled on appropriate nodes to prevent privilege escalation and lateral movement within the cluster.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of containerized applications and infrastructure managed via OpenShift. Exploitation could lead to unauthorized access to sensitive workloads running on control plane and etcd nodes, potentially exposing critical data and disrupting cluster operations. This can affect confidentiality by exposing sensitive information, integrity by allowing unauthorized workload manipulation, and availability by destabilizing cluster components. Organizations in sectors such as finance, healthcare, telecommunications, and government, which rely heavily on container orchestration for critical services, could face operational disruptions and data breaches. The risk is amplified in multi-tenant or hybrid cloud environments where workload isolation is paramount. Additionally, regulatory compliance requirements in Europe, such as GDPR, impose strict data protection obligations that could be violated if this vulnerability is exploited. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score necessitates urgent attention to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2023-5408, European organizations should: 1) Apply the latest security patches and updates from Red Hat OpenShift as soon as they become available to address the vulnerability directly. 2) Implement strict RBAC policies to limit which users and service accounts can modify node labels, especially node role labels, to prevent unauthorized changes. 3) Monitor and audit node label changes continuously using Kubernetes audit logs and integrate alerts for suspicious modifications. 4) Enforce workload scheduling policies that restrict workloads from running on control plane and etcd nodes unless explicitly required and authorized. 5) Use network segmentation and pod security policies to limit the impact of compromised workloads and prevent lateral movement within the cluster. 6) Conduct regular security assessments and penetration testing focused on Kubernetes admission controls and node management. 7) Educate cluster administrators on the risks associated with node label modifications and privilege escalation paths. These targeted actions go beyond generic advice by focusing on controlling node label integrity and workload placement, which are central to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-04T17:58:23.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a239ba0e608b4f980f37

Added to database: 10/9/2025, 11:53:29 AM

Last enriched: 11/7/2025, 10:52:40 AM

Last updated: 12/4/2025, 10:20:57 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats