Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6476: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.13

0
Medium
VulnerabilityCVE-2023-6476cvecve-2023-6476
Published: Tue Jan 09 2024 (01/09/2024, 21:32:03 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.13

Description

A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.

AI-Powered Analysis

AILast updated: 10/10/2025, 00:23:44 UTC

Technical Analysis

CVE-2023-6476 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.13, specifically related to the CRI-O container runtime component. The flaw arises from an experimental annotation that can cause a container to run in an unconfined state. This misconfiguration allows a pod to specify and obtain unlimited CPU and memory resources, effectively circumventing the Kubernetes scheduler's resource allocation and throttling mechanisms. As a result, a malicious or compromised pod can consume excessive node resources, potentially leading to denial of service (DoS) conditions by starving other workloads or destabilizing the node. The vulnerability has a CVSS v3.1 score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects availability (A:H) without compromising confidentiality or integrity. No public exploits have been reported so far. This vulnerability is particularly concerning in multi-tenant or shared cluster environments where resource isolation is critical. The flaw highlights the risks of experimental features in container runtimes and the importance of strict resource governance in Kubernetes-based platforms.

Potential Impact

For European organizations, especially those relying on Red Hat OpenShift 4.13 for container orchestration, this vulnerability poses a significant risk to service availability. Exploitation could allow attackers or malicious insiders to launch denial of service attacks by exhausting node CPU and memory resources, disrupting critical applications and services. This is particularly impactful for sectors with high cloud-native adoption such as finance, telecommunications, and public services. The lack of confidentiality or integrity impact limits data breach concerns, but availability degradation can cause operational downtime and financial losses. Multi-tenant environments and managed service providers are at higher risk due to shared infrastructure. The vulnerability could also complicate compliance with European regulations requiring service continuity and resilience. Although no known exploits exist yet, the ease of exploitation and potential for resource exhaustion make timely mitigation essential.

Mitigation Recommendations

Organizations should immediately audit their OpenShift 4.13 deployments for usage of the experimental annotation in CRI-O that leads to unconfined containers. Restrict or disable experimental features unless absolutely necessary. Implement strict resource quotas and limits at the namespace and pod level to prevent resource overconsumption. Monitor node resource usage closely to detect anomalous spikes indicative of exploitation attempts. Upgrade to patched versions of OpenShift and CRI-O as soon as Red Hat releases fixes. Employ admission controllers or policy enforcement tools (e.g., OPA Gatekeeper) to block pods requesting excessive resources or unconfined security contexts. Conduct regular security reviews of container runtime configurations and Kubernetes scheduler policies. For managed environments, coordinate with service providers to ensure mitigations are applied. Finally, maintain incident response plans to quickly isolate affected nodes if a denial of service is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-12-04T06:23:22.231Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84e5dba0e608b4fb0c52c

Added to database: 10/10/2025, 12:07:57 AM

Last enriched: 10/10/2025, 12:23:44 AM

Last updated: 10/10/2025, 9:10:40 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats