Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25131: Improper Input Validation

0
High
VulnerabilityCVE-2024-25131cvecve-2024-25131
Published: Thu Dec 19 2024 (12/19/2024, 14:18:05 UTC)
Source: CVE Database V5

Description

A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:30:18 UTC

Technical Analysis

CVE-2024-25131 is a critical security vulnerability identified in the MustGather.managed.openshift.io Custom Defined Resource (CRD) within OpenShift Dedicated, a managed Kubernetes service by Red Hat. The vulnerability arises from improper input validation in the MustGather resource, which is designed to collect diagnostic data. A non-privileged user on the cluster can exploit this flaw by creating a MustGather object containing a specially crafted file that manipulates the job execution context. Specifically, the attacker can assign the job to run under the cluster's most privileged service account, effectively escalating their privileges from a standard developer role to cluster administrator. This escalation grants the attacker full administrative control over the OpenShift cluster, including the ability to modify cluster configurations, deploy malicious workloads, or exfiltrate sensitive data. Furthermore, because OpenShift Dedicated often runs on AWS infrastructure, the attacker can leverage this elevated access to pivot into the AWS environment, potentially compromising cloud resources beyond the Kubernetes cluster. The vulnerability has a CVSS v3.1 score of 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no requirement for user interaction. While no public exploits are known at this time, the flaw represents a significant risk due to the ease of exploitation and the critical nature of the privileges gained. The vulnerability was publicly disclosed on December 19, 2024, and affects all versions of OpenShift Dedicated using this CRD. Mitigation requires patching the affected component or applying strict access controls to limit who can create MustGather objects and assign service accounts.

Potential Impact

The impact of CVE-2024-25131 is substantial for organizations using OpenShift Dedicated, particularly those leveraging AWS infrastructure. Successful exploitation allows an attacker with minimal privileges to escalate to cluster administrator, granting full control over the Kubernetes environment. This can lead to unauthorized deployment of malicious containers, data exfiltration, disruption of critical services, and compromise of sensitive information. The ability to pivot into the AWS environment further amplifies the risk, potentially exposing cloud resources, storage, and other services to compromise. For enterprises relying on OpenShift for production workloads, this vulnerability threatens the confidentiality, integrity, and availability of their applications and data. The broad scope of affected systems and the ease of exploitation make this a critical concern for cloud-native deployments and hybrid cloud environments. Additionally, regulatory compliance and trust may be impacted if breaches occur due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-25131, organizations should immediately apply any patches or updates released by Red Hat for OpenShift Dedicated that address this vulnerability. If patches are not yet available, restrict permissions to create or modify MustGather objects to only highly trusted administrators. Implement strict Role-Based Access Control (RBAC) policies to prevent non-privileged users from assigning privileged service accounts to jobs. Monitor audit logs for unusual creation of MustGather resources or jobs running under privileged accounts. Employ network segmentation and limit access to the OpenShift API server to reduce the attack surface. Additionally, consider deploying runtime security tools that can detect anomalous privilege escalations or suspicious container behavior. Regularly review and update cloud IAM policies to ensure that compromised cluster credentials cannot easily pivot to AWS resources. Finally, conduct security awareness and incident response drills focused on Kubernetes privilege escalation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-02-05T18:35:14.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5fb7ef31ef0b570c8a

Added to database: 2/25/2026, 9:45:03 PM

Last enriched: 2/26/2026, 10:30:18 AM

Last updated: 4/12/2026, 3:33:45 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses