Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45497: Incorrect Permission Assignment for Critical Resource

0
High
VulnerabilityCVE-2024-45497cvecve-2024-45497
Published: Tue Dec 31 2024 (12/31/2024, 02:19:22 UTC)
Source: CVE Database V5

Description

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:58:24 UTC

Technical Analysis

CVE-2024-45497 is a vulnerability identified in the OpenShift 4.16 build process involving improper permission assignment on a critical resource. Specifically, the docker-build container mounts the node's /var/lib/kubelet/config.json file as a hostPath volume into the build pod. This file contains sensitive credentials used by the kubelet to authenticate and pull container images from private registries. The vulnerability arises because the mount is configured with write permissions rather than read-only, allowing an attacker with access to the build pod to modify or overwrite the config.json file. By doing so, the attacker can disrupt the node's ability to pull new images, effectively causing a denial of service (DoS) for workloads dependent on image updates. Additionally, the attacker can potentially exfiltrate sensitive secrets contained within the config.json file, compromising confidentiality. The CVSS 3.1 base score is 7.6 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and impacts on confidentiality, integrity, and high impact on availability. The flaw affects OpenShift version 4.16 and was published on December 31, 2024. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of the credentials and the critical role of image pulls in container orchestration. The root cause is the incorrect permission assignment on the hostPath volume mount, which should be read-only to prevent unauthorized modifications. This vulnerability highlights the importance of strict access controls on hostPath mounts in containerized environments.

Potential Impact

The vulnerability can have severe impacts on organizations running OpenShift 4.16 clusters. By overwriting the kubelet's config.json file, attackers can cause denial of service by preventing nodes from pulling updated container images, potentially halting deployment pipelines and application updates. This disruption can lead to downtime or degraded service availability, affecting business continuity. Furthermore, the exposure of sensitive credentials within config.json risks unauthorized access to private container registries, enabling attackers to exfiltrate secrets or inject malicious images. This compromises confidentiality and integrity of container workloads. The attack requires privileges to the build pod but no user interaction, making it feasible for insiders or attackers who have compromised build processes. The scope includes all nodes running vulnerable OpenShift versions, potentially impacting large-scale container deployments. The combined impact on availability, confidentiality, and integrity makes this a critical operational and security risk for organizations relying on OpenShift for container orchestration.

Mitigation Recommendations

To mitigate CVE-2024-45497, organizations should immediately review and update the configuration of docker-build containers to ensure the hostPath volume mount for /var/lib/kubelet/config.json is set to read-only. This prevents unauthorized modification of the kubelet credentials file. Applying vendor-provided patches or updates for OpenShift 4.16 that address this issue is critical once available. Until patches are deployed, restrict access to build pods by enforcing strict RBAC policies to limit which users or service accounts can initiate builds. Monitor build pod activities for suspicious file modifications or unexpected behavior related to config.json. Employ runtime security tools to detect and block unauthorized writes to sensitive hostPath mounts. Additionally, rotate credentials used in config.json regularly and audit image pull logs for anomalies. Consider isolating build environments from production nodes to reduce the attack surface. Finally, educate DevOps and security teams about the risks of writable hostPath mounts and enforce secure container build practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-08-30T10:12:13.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68467fab71f4d251b582404b

Added to database: 6/9/2025, 6:31:07 AM

Last enriched: 2/28/2026, 6:58:24 AM

Last updated: 3/25/2026, 12:15:11 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses