Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45497: Incorrect Permission Assignment for Critical Resource

0
High
VulnerabilityCVE-2024-45497cvecve-2024-45497
Published: Tue Dec 31 2024 (12/31/2024, 02:19:22 UTC)
Source: CVE Database V5

Description

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:43:45 UTC

Technical Analysis

CVE-2024-45497 is a vulnerability identified in OpenShift version 4.16 affecting the docker-build container configuration. The issue arises because the build container mounts the node's /var/lib/kubelet/config.json file as a hostPath volume into the build pod with read-write permissions instead of read-only. This config.json file contains sensitive credentials required for authenticating and pulling container images from private registries. Since the mount is writable, an attacker who can execute builds within OpenShift can modify or overwrite this file. Such modification can disrupt the node’s ability to pull new container images, causing denial of service for workloads dependent on image updates. Additionally, the attacker may exfiltrate sensitive credentials stored in the config.json file, leading to confidentiality breaches. The vulnerability requires the attacker to have build pod privileges (PR:L) but does not require user interaction (UI:N). The CVSS score of 7.6 reflects a high severity due to the combination of confidentiality, integrity, and availability impacts. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to environments relying on OpenShift for container orchestration, especially those using private image registries. The flaw highlights a misconfiguration in volume mount permissions that should be corrected to prevent unauthorized modification of critical node configuration files.

Potential Impact

For European organizations, this vulnerability can have severe operational and security consequences. Organizations using OpenShift 4.16 with private container registries risk service disruption due to denial of service caused by failed image pulls, potentially affecting production workloads and continuous deployment pipelines. The exposure of sensitive credentials in config.json can lead to unauthorized access to private registries, enabling attackers to steal proprietary container images or inject malicious images into the supply chain. This can undermine the integrity of deployed applications and lead to further compromise. The disruption of container image pulls can impact availability of critical services, especially in sectors like finance, healthcare, and manufacturing where containerized applications are integral. Confidentiality breaches may also violate data protection regulations such as GDPR, leading to legal and reputational damage. The requirement for build pod privileges means insider threats or compromised developer accounts pose a significant risk vector. Overall, the vulnerability threatens confidentiality, integrity, and availability of containerized workloads in European enterprises relying on OpenShift.

Mitigation Recommendations

To mitigate CVE-2024-45497, organizations should immediately audit and restrict volume mount permissions in OpenShift build pods to ensure that sensitive hostPath volumes such as /var/lib/kubelet/config.json are mounted as read-only or not mounted at all. Implement strict role-based access control (RBAC) to limit who can create or modify build pods and restrict build privileges to trusted users only. Monitor build pod activities and file system changes to detect unauthorized modifications to critical configuration files. Apply any available vendor patches or updates from Red Hat as soon as they are released. Consider isolating build environments from nodes containing sensitive credentials or using alternative build strategies that do not require mounting sensitive host paths. Regularly rotate credentials stored in config.json and audit container registry access logs for suspicious activity. Employ runtime security tools to detect anomalous behavior in build pods. Finally, educate developers and DevOps teams about the risks of privileged build environments and enforce security best practices in CI/CD pipelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-08-30T10:12:13.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68467fab71f4d251b582404b

Added to database: 6/9/2025, 6:31:07 AM

Last enriched: 11/20/2025, 9:43:45 PM

Last updated: 12/1/2025, 9:13:50 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats