Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13

0
Medium
VulnerabilityCVE-2023-6476cvecve-2023-6476
Published: Tue Jan 09 2024 (01/09/2024, 21:32:03 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.13

Description

A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:46:42 UTC

Technical Analysis

CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation feature in CRI-O that can cause a container to become unconfined in terms of resource allocation. Normally, Kubernetes uses a scheduler to enforce resource limits on pods, ensuring fair distribution of CPU and memory resources across the cluster. However, this vulnerability allows a pod to specify and obtain an unlimited amount of CPU and memory resources by exploiting the experimental annotation, effectively bypassing the Kubernetes scheduler's resource constraints. This can lead to resource exhaustion on the node hosting the pod, resulting in a denial of service (DoS) condition that affects availability but does not compromise confidentiality or integrity. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N). There are no known exploits in the wild at the time of publication, and no patches have been explicitly linked yet. The CVSS v3.1 base score is 6.5, indicating medium severity. The flaw highlights risks associated with experimental features in container runtimes and the importance of strict resource management in Kubernetes environments.

Potential Impact

For European organizations, especially those relying on Red Hat OpenShift Container Platform 4.13 for container orchestration and cloud-native deployments, this vulnerability poses a significant risk to service availability. An attacker or misconfigured pod could consume excessive CPU and memory resources, leading to node instability or crashes, which in turn could disrupt critical business applications and services. This is particularly impactful for sectors with high reliance on containerized workloads such as finance, telecommunications, healthcare, and public services. The denial of service could affect multi-tenant environments and shared infrastructure, potentially causing cascading failures in clustered or cloud environments. Although the vulnerability does not affect data confidentiality or integrity, the operational disruption could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability is compromised.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Monitor Red Hat and OpenShift advisories closely and apply official patches or updates as soon as they become available. 2) Disable or avoid using the experimental annotation feature in CRI-O that enables unconfined resource allocation until a fix is released. 3) Implement strict Kubernetes resource quotas and limit ranges at the namespace level to enforce maximum CPU and memory usage per pod, preventing resource exhaustion. 4) Use admission controllers to validate pod specifications and reject pods attempting to bypass resource constraints. 5) Employ runtime monitoring and alerting tools to detect abnormal resource consumption patterns indicative of exploitation attempts. 6) Conduct regular security audits of container configurations and cluster policies to ensure compliance with best practices. 7) Consider isolating critical workloads on dedicated nodes or clusters to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on configuration hardening and proactive detection tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-12-04T06:23:22.231Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84e5dba0e608b4fb0c52c

Added to database: 10/10/2025, 12:07:57 AM

Last enriched: 11/20/2025, 6:46:42 PM

Last updated: 12/4/2025, 8:12:02 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats