Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5408: Improper Privilege Management in Red Hat Red Hat OpenShift Container Platform 4.11

0
High
VulnerabilityCVE-2023-5408cvecve-2023-5408
Published: Thu Nov 02 2023 (11/02/2023, 02:55:58 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.11

Description

A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

AI-Powered Analysis

AILast updated: 10/09/2025, 12:09:00 UTC

Technical Analysis

CVE-2023-5408 is a vulnerability identified in the node restriction admission plugin of the Kubernetes API server component within Red Hat OpenShift Container Platform version 4.11. The node restriction admission plugin is designed to enforce constraints on node labels and restrict workloads to appropriate nodes, thereby protecting critical components such as the control plane and etcd nodes from unauthorized workload scheduling. The flaw arises because an attacker with the ability to modify the node role label can manipulate the workload scheduling process. By altering node labels, the attacker can cause workloads originally intended for control plane or etcd nodes to be scheduled onto different worker nodes. This misplacement can lead to privilege escalation, as the attacker gains broader access to cluster resources and potentially sensitive data or control functions. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity. The vector (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network with low complexity, requires high privileges, no user interaction, and impacts confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential impact is significant due to the critical nature of the affected components. This vulnerability highlights the importance of strict privilege management and label integrity within Kubernetes clusters managed by OpenShift. Organizations relying on OpenShift 4.11 should monitor for patches and updates from Red Hat and review their node role label management policies to prevent unauthorized modifications.

Potential Impact

For European organizations, the impact of CVE-2023-5408 can be substantial, especially for those deploying Red Hat OpenShift in production environments managing critical workloads. The ability to escalate privileges by manipulating node labels undermines the security boundaries between control plane, etcd, and worker nodes, potentially exposing sensitive cluster management data and control functions. This can lead to unauthorized access to confidential information, disruption of cluster operations, and compromise of workload integrity. Industries such as finance, healthcare, telecommunications, and government services in Europe that rely on container orchestration for critical applications are at heightened risk. The vulnerability could facilitate lateral movement within the cluster, enabling attackers to pivot to other systems or exfiltrate data. Additionally, the disruption of control plane or etcd nodes could impact availability, causing service outages. Given the increasing adoption of container platforms in Europe, failure to address this vulnerability could result in regulatory compliance issues, reputational damage, and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2023-5408, European organizations should implement the following specific measures: 1) Apply patches and updates from Red Hat as soon as they become available to address the vulnerability directly. 2) Enforce strict access controls and role-based access control (RBAC) policies to limit who can modify node labels, ensuring only trusted administrators have such privileges. 3) Implement continuous monitoring and auditing of node label changes and workload scheduling events to detect unauthorized modifications promptly. 4) Use admission controllers and policy enforcement tools (e.g., Open Policy Agent) to validate node labels and workload placements dynamically. 5) Segment the cluster network to isolate control plane and etcd nodes from worker nodes, reducing the impact of potential privilege escalations. 6) Conduct regular security reviews and penetration testing focused on Kubernetes admission plugins and node management. 7) Educate DevOps and security teams about the risks of improper node label management and privilege escalation paths. These targeted actions go beyond generic advice by focusing on the specific attack vector and cluster components involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-04T17:58:23.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a239ba0e608b4f980f37

Added to database: 10/9/2025, 11:53:29 AM

Last enriched: 10/9/2025, 12:09:00 PM

Last updated: 10/14/2025, 7:58:13 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats