CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
AI Analysis
Technical Summary
CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation that can cause a container to run in an unconfined state. This misconfiguration allows a pod to specify and obtain unlimited CPU and memory resources, effectively circumventing the Kubernetes scheduler's resource allocation and throttling mechanisms. As a result, a malicious or compromised pod can consume excessive node resources, potentially leading to denial of service (DoS) conditions by starving other workloads or destabilizing the node. The vulnerability has a CVSS v3.1 score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects availability (A:H) without compromising confidentiality or integrity. No public exploits have been reported so far. This vulnerability is particularly concerning in multi-tenant or shared cluster environments where resource isolation is critical. The flaw highlights the risks of experimental features in container runtimes and the importance of strict resource governance in Kubernetes-based platforms.
Potential Impact
For European organizations, especially those relying on Red Hat OpenShift 4.13 for container orchestration, this vulnerability poses a significant risk to service availability. Exploitation could allow attackers or malicious insiders to launch denial of service attacks by exhausting node CPU and memory resources, disrupting critical applications and services. This is particularly impactful for sectors with high cloud-native adoption such as finance, telecommunications, and public services. The lack of confidentiality or integrity impact limits data breach concerns, but availability degradation can cause operational downtime and financial losses. Multi-tenant environments and managed service providers are at higher risk due to shared infrastructure. The vulnerability could also complicate compliance with European regulations requiring service continuity and resilience. Although no known exploits exist yet, the ease of exploitation and potential for resource exhaustion make timely mitigation essential.
Mitigation Recommendations
Organizations should immediately audit their OpenShift 4.13 deployments for usage of the experimental annotation in CRI-O that leads to unconfined containers. Restrict or disable experimental features unless absolutely necessary. Implement strict resource quotas and limits at the namespace and pod level to prevent resource overconsumption. Monitor node resource usage closely to detect anomalous spikes indicative of exploitation attempts. Upgrade to patched versions of OpenShift and CRI-O as soon as Red Hat releases fixes. Employ admission controllers or policy enforcement tools (e.g., OPA Gatekeeper) to block pods requesting excessive resources or unconfined security contexts. Conduct regular security reviews of container runtime configurations and Kubernetes scheduler policies. For managed environments, coordinate with service providers to ensure mitigations are applied. Finally, maintain incident response plans to quickly isolate affected nodes if a denial of service is detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13
Description
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
AI-Powered Analysis
Technical Analysis
CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation that can cause a container to run in an unconfined state. This misconfiguration allows a pod to specify and obtain unlimited CPU and memory resources, effectively circumventing the Kubernetes scheduler's resource allocation and throttling mechanisms. As a result, a malicious or compromised pod can consume excessive node resources, potentially leading to denial of service (DoS) conditions by starving other workloads or destabilizing the node. The vulnerability has a CVSS v3.1 score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects availability (A:H) without compromising confidentiality or integrity. No public exploits have been reported so far. This vulnerability is particularly concerning in multi-tenant or shared cluster environments where resource isolation is critical. The flaw highlights the risks of experimental features in container runtimes and the importance of strict resource governance in Kubernetes-based platforms.
Potential Impact
For European organizations, especially those relying on Red Hat OpenShift 4.13 for container orchestration, this vulnerability poses a significant risk to service availability. Exploitation could allow attackers or malicious insiders to launch denial of service attacks by exhausting node CPU and memory resources, disrupting critical applications and services. This is particularly impactful for sectors with high cloud-native adoption such as finance, telecommunications, and public services. The lack of confidentiality or integrity impact limits data breach concerns, but availability degradation can cause operational downtime and financial losses. Multi-tenant environments and managed service providers are at higher risk due to shared infrastructure. The vulnerability could also complicate compliance with European regulations requiring service continuity and resilience. Although no known exploits exist yet, the ease of exploitation and potential for resource exhaustion make timely mitigation essential.
Mitigation Recommendations
Organizations should immediately audit their OpenShift 4.13 deployments for usage of the experimental annotation in CRI-O that leads to unconfined containers. Restrict or disable experimental features unless absolutely necessary. Implement strict resource quotas and limits at the namespace and pod level to prevent resource overconsumption. Monitor node resource usage closely to detect anomalous spikes indicative of exploitation attempts. Upgrade to patched versions of OpenShift and CRI-O as soon as Red Hat releases fixes. Employ admission controllers or policy enforcement tools (e.g., OPA Gatekeeper) to block pods requesting excessive resources or unconfined security contexts. Conduct regular security reviews of container runtime configurations and Kubernetes scheduler policies. For managed environments, coordinate with service providers to ensure mitigations are applied. Finally, maintain incident response plans to quickly isolate affected nodes if a denial of service is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-12-04T06:23:22.231Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e84e5dba0e608b4fb0c52c
Added to database: 10/10/2025, 12:07:57 AM
Last enriched: 10/10/2025, 12:23:44 AM
Last updated: 10/10/2025, 9:10:40 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-52655: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in HCL HCL MyXalytics
LowCVE-2025-40646: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Status Tracker Energy CRM
MediumCVE-2025-40640: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Status Tracker Energy CRM
MediumCVE-2025-21050: CWE-20: Improper Input Validation in Samsung Mobile Samsung Mobile Devices
HighCVE-2025-10124: CWE-863 Incorrect Authorization in Booking Manager
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.