Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5625: Allocation of Resources Without Limits or Throttling in Red Hat Ironic content for Red Hat OpenShift Container Platform 4.12

0
Medium
VulnerabilityCVE-2023-5625cvecve-2023-5625
Published: Wed Nov 01 2023 (11/01/2023, 13:28:10 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Ironic content for Red Hat OpenShift Container Platform 4.12

Description

A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:45:00 UTC

Technical Analysis

CVE-2023-5625 is a vulnerability identified in the Red Hat build of python-eventlet, specifically impacting the Ironic content component of Red Hat OpenShift Container Platform version 4.12. The root cause is a regression introduced by a change in the patch application strategy, which led to the patch addressing CVE-2021-21419 not being applied across all builds and products. This omission reintroduces a flaw where resource allocation is not properly limited or throttled, leading to potential uncontrolled consumption of system resources (CWE-400). The vulnerability allows an unauthenticated remote attacker to trigger excessive resource usage, potentially causing denial of service conditions by exhausting CPU, memory, or other critical resources. The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No integrity or confidentiality impacts are noted. Currently, there are no known exploits in the wild, but the vulnerability could be leveraged in denial of service attacks against affected OpenShift deployments. The lack of applied patch across all builds indicates a systemic issue in the patch management process for this component. Organizations running OpenShift 4.12 with the affected Ironic content should prioritize verification of patch status and resource monitoring to mitigate potential exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2023-5625 is the risk of denial of service (DoS) due to uncontrolled resource consumption in OpenShift Container Platform 4.12 environments using the affected Ironic content. This can disrupt container orchestration and management workflows, potentially causing downtime or degraded performance of critical applications and services hosted on OpenShift clusters. Industries relying heavily on containerized infrastructure, such as finance, telecommunications, manufacturing, and public sector services, may experience operational interruptions. The vulnerability does not compromise data confidentiality or integrity but can affect availability, which is critical for business continuity. Given the increasing adoption of OpenShift in Europe for hybrid and private cloud deployments, unmitigated exploitation could lead to significant service outages. Additionally, the lack of authentication requirement lowers the barrier for attackers to attempt exploitation remotely. While no active exploits are reported, the medium severity score and nature of the vulnerability warrant proactive mitigation to avoid potential service disruptions.

Mitigation Recommendations

1. Verify the current patch status of the python-eventlet package and the Ironic content within OpenShift Container Platform 4.12 deployments; apply any official patches or updates from Red Hat as soon as they become available. 2. Implement resource quotas and limits at the Kubernetes/OpenShift level to restrict CPU, memory, and other resource usage per pod or container, preventing any single workload from exhausting cluster resources. 3. Monitor resource consumption metrics closely using OpenShift monitoring tools or third-party solutions to detect abnormal spikes indicative of exploitation attempts. 4. Employ network-level controls such as rate limiting and firewall rules to restrict access to the Ironic service endpoints, reducing exposure to unauthenticated remote attacks. 5. Review and harden the patch management and build processes to ensure that critical security patches are consistently applied across all product builds, preventing regressions. 6. Consider isolating or segmenting workloads that utilize the affected Ironic content to minimize the blast radius in case of exploitation. 7. Stay informed through Red Hat security advisories and subscribe to vulnerability notifications to respond promptly to any new developments or exploit disclosures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-17T22:35:25.280Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84e5dba0e608b4fb0c50a

Added to database: 10/10/2025, 12:07:57 AM

Last enriched: 11/20/2025, 6:45:00 PM

Last updated: 12/5/2025, 12:04:43 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats