CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
AI Analysis
Technical Summary
CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation feature in CRI-O that can cause a container to become unconfined in terms of resource allocation. Normally, Kubernetes uses a scheduler to enforce resource limits on pods, ensuring fair distribution of CPU and memory resources across the cluster. However, this vulnerability allows a pod to specify and obtain an unlimited amount of CPU and memory resources by exploiting the experimental annotation, effectively bypassing the Kubernetes scheduler's resource constraints. This can lead to resource exhaustion on the node hosting the pod, resulting in a denial of service (DoS) condition that affects availability but does not compromise confidentiality or integrity. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N). There are no known exploits in the wild at the time of publication, and no patches have been explicitly linked yet. The CVSS v3.1 base score is 6.5, indicating medium severity. The flaw highlights risks associated with experimental features in container runtimes and the importance of strict resource management in Kubernetes environments.
Potential Impact
For European organizations, especially those relying on Red Hat OpenShift Container Platform 4.13 for container orchestration and cloud-native deployments, this vulnerability poses a significant risk to service availability. An attacker or misconfigured pod could consume excessive CPU and memory resources, leading to node instability or crashes, which in turn could disrupt critical business applications and services. This is particularly impactful for sectors with high reliance on containerized workloads such as finance, telecommunications, healthcare, and public services. The denial of service could affect multi-tenant environments and shared infrastructure, potentially causing cascading failures in clustered or cloud environments. Although the vulnerability does not affect data confidentiality or integrity, the operational disruption could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability is compromised.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Monitor Red Hat and OpenShift advisories closely and apply official patches or updates as soon as they become available. 2) Disable or avoid using the experimental annotation feature in CRI-O that enables unconfined resource allocation until a fix is released. 3) Implement strict Kubernetes resource quotas and limit ranges at the namespace level to enforce maximum CPU and memory usage per pod, preventing resource exhaustion. 4) Use admission controllers to validate pod specifications and reject pods attempting to bypass resource constraints. 5) Employ runtime monitoring and alerting tools to detect abnormal resource consumption patterns indicative of exploitation attempts. 6) Conduct regular security audits of container configurations and cluster policies to ensure compliance with best practices. 7) Consider isolating critical workloads on dedicated nodes or clusters to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on configuration hardening and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13
Description
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
AI-Powered Analysis
Technical Analysis
CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation feature in CRI-O that can cause a container to become unconfined in terms of resource allocation. Normally, Kubernetes uses a scheduler to enforce resource limits on pods, ensuring fair distribution of CPU and memory resources across the cluster. However, this vulnerability allows a pod to specify and obtain an unlimited amount of CPU and memory resources by exploiting the experimental annotation, effectively bypassing the Kubernetes scheduler's resource constraints. This can lead to resource exhaustion on the node hosting the pod, resulting in a denial of service (DoS) condition that affects availability but does not compromise confidentiality or integrity. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N). There are no known exploits in the wild at the time of publication, and no patches have been explicitly linked yet. The CVSS v3.1 base score is 6.5, indicating medium severity. The flaw highlights risks associated with experimental features in container runtimes and the importance of strict resource management in Kubernetes environments.
Potential Impact
For European organizations, especially those relying on Red Hat OpenShift Container Platform 4.13 for container orchestration and cloud-native deployments, this vulnerability poses a significant risk to service availability. An attacker or misconfigured pod could consume excessive CPU and memory resources, leading to node instability or crashes, which in turn could disrupt critical business applications and services. This is particularly impactful for sectors with high reliance on containerized workloads such as finance, telecommunications, healthcare, and public services. The denial of service could affect multi-tenant environments and shared infrastructure, potentially causing cascading failures in clustered or cloud environments. Although the vulnerability does not affect data confidentiality or integrity, the operational disruption could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability is compromised.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Monitor Red Hat and OpenShift advisories closely and apply official patches or updates as soon as they become available. 2) Disable or avoid using the experimental annotation feature in CRI-O that enables unconfined resource allocation until a fix is released. 3) Implement strict Kubernetes resource quotas and limit ranges at the namespace level to enforce maximum CPU and memory usage per pod, preventing resource exhaustion. 4) Use admission controllers to validate pod specifications and reject pods attempting to bypass resource constraints. 5) Employ runtime monitoring and alerting tools to detect abnormal resource consumption patterns indicative of exploitation attempts. 6) Conduct regular security audits of container configurations and cluster policies to ensure compliance with best practices. 7) Consider isolating critical workloads on dedicated nodes or clusters to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on configuration hardening and proactive detection tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-12-04T06:23:22.231Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e84e5dba0e608b4fb0c52c
Added to database: 10/10/2025, 12:07:57 AM
Last enriched: 11/20/2025, 6:46:42 PM
Last updated: 12/4/2025, 8:12:02 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.