CVE-2025-12103: Incorrect Privilege Assignment in Red Hat Red Hat OpenShift AI (RHOAI)
A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`
AI Analysis
Technical Summary
CVE-2025-12103 is a vulnerability identified in the TrustyAI component of Red Hat OpenShift AI (RHOAI). The issue arises from an incorrect privilege assignment where a role named `trustyai-service-operator-lmeval-user-role` and a cluster role binding `trustyai-service-operator-default-lmeval-user-rolebinding` are created and bound to the `system:authenticated` group. This group includes every authenticated user and service account on the cluster, effectively granting them permissions to get, list, and watch any pod in any namespace. Furthermore, the vulnerability extends access to all persistent volume claims (PVCs) and lmevaljobs, which are custom resources related to AI model evaluation jobs. This misconfiguration results in an information disclosure vulnerability, allowing unauthorized users to enumerate pods and PVCs cluster-wide. While it does not permit modification or deletion of resources, the exposure of resource metadata and state can facilitate reconnaissance and subsequent attacks. The vulnerability has a CVSS 3.1 base score of 5.0 (medium severity), with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and a scope change since it affects cluster-wide resources. No patches or exploits are currently reported, but the flaw is publicly disclosed and should be addressed promptly to prevent misuse.
Potential Impact
For European organizations leveraging Red Hat OpenShift AI, this vulnerability can lead to unauthorized information disclosure about cluster workloads and storage resources. Attackers or malicious insiders with any authenticated access can enumerate pods and persistent volume claims across all namespaces, potentially revealing sensitive application details, deployment patterns, or data storage configurations. This information can be leveraged to identify high-value targets, plan lateral movement, or exploit other vulnerabilities. Although the vulnerability does not allow direct modification or disruption of resources, the confidentiality impact is significant in environments handling sensitive AI workloads or regulated data. The exposure of lmevaljobs could reveal proprietary AI model evaluation processes. Organizations in sectors such as finance, healthcare, and critical infrastructure, which often deploy AI workloads on OpenShift, may face increased risk. The medium severity rating reflects the balance between ease of exploitation (authenticated access required) and the impact limited to information disclosure without integrity or availability compromise.
Mitigation Recommendations
To mitigate CVE-2025-12103, organizations should first audit the cluster role bindings and roles created by the TrustyAI component, specifically the `trustyai-service-operator-lmeval-user-role` and `trustyai-service-operator-default-lmeval-user-rolebinding`. Immediate steps include removing or restricting the cluster role binding from the `system:authenticated` group to limit permissions only to necessary service accounts or users. Implement the principle of least privilege by creating dedicated roles for TrustyAI components with narrowly scoped permissions. Monitor and log access to pods, persistent volume claims, and lmevaljobs to detect unusual enumeration activity. If available, apply vendor patches or updates from Red Hat addressing this issue as soon as they are released. Additionally, enforce strong authentication and authorization controls on the OpenShift cluster, including network segmentation and RBAC policies that prevent broad access to sensitive resources. Regularly review and tighten cluster-wide permissions and consider using admission controllers or policy enforcement tools (e.g., Open Policy Agent) to prevent overly permissive role bindings. Finally, educate cluster administrators about the risks of granting broad permissions to authenticated users and service accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-12103: Incorrect Privilege Assignment in Red Hat Red Hat OpenShift AI (RHOAI)
Description
A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`
AI-Powered Analysis
Technical Analysis
CVE-2025-12103 is a vulnerability identified in the TrustyAI component of Red Hat OpenShift AI (RHOAI). The issue arises from an incorrect privilege assignment where a role named `trustyai-service-operator-lmeval-user-role` and a cluster role binding `trustyai-service-operator-default-lmeval-user-rolebinding` are created and bound to the `system:authenticated` group. This group includes every authenticated user and service account on the cluster, effectively granting them permissions to get, list, and watch any pod in any namespace. Furthermore, the vulnerability extends access to all persistent volume claims (PVCs) and lmevaljobs, which are custom resources related to AI model evaluation jobs. This misconfiguration results in an information disclosure vulnerability, allowing unauthorized users to enumerate pods and PVCs cluster-wide. While it does not permit modification or deletion of resources, the exposure of resource metadata and state can facilitate reconnaissance and subsequent attacks. The vulnerability has a CVSS 3.1 base score of 5.0 (medium severity), with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and a scope change since it affects cluster-wide resources. No patches or exploits are currently reported, but the flaw is publicly disclosed and should be addressed promptly to prevent misuse.
Potential Impact
For European organizations leveraging Red Hat OpenShift AI, this vulnerability can lead to unauthorized information disclosure about cluster workloads and storage resources. Attackers or malicious insiders with any authenticated access can enumerate pods and persistent volume claims across all namespaces, potentially revealing sensitive application details, deployment patterns, or data storage configurations. This information can be leveraged to identify high-value targets, plan lateral movement, or exploit other vulnerabilities. Although the vulnerability does not allow direct modification or disruption of resources, the confidentiality impact is significant in environments handling sensitive AI workloads or regulated data. The exposure of lmevaljobs could reveal proprietary AI model evaluation processes. Organizations in sectors such as finance, healthcare, and critical infrastructure, which often deploy AI workloads on OpenShift, may face increased risk. The medium severity rating reflects the balance between ease of exploitation (authenticated access required) and the impact limited to information disclosure without integrity or availability compromise.
Mitigation Recommendations
To mitigate CVE-2025-12103, organizations should first audit the cluster role bindings and roles created by the TrustyAI component, specifically the `trustyai-service-operator-lmeval-user-role` and `trustyai-service-operator-default-lmeval-user-rolebinding`. Immediate steps include removing or restricting the cluster role binding from the `system:authenticated` group to limit permissions only to necessary service accounts or users. Implement the principle of least privilege by creating dedicated roles for TrustyAI components with narrowly scoped permissions. Monitor and log access to pods, persistent volume claims, and lmevaljobs to detect unusual enumeration activity. If available, apply vendor patches or updates from Red Hat addressing this issue as soon as they are released. Additionally, enforce strong authentication and authorization controls on the OpenShift cluster, including network segmentation and RBAC policies that prevent broad access to sensitive resources. Regularly review and tighten cluster-wide permissions and consider using admission controllers or policy enforcement tools (e.g., Open Policy Agent) to prevent overly permissive role bindings. Finally, educate cluster administrators about the risks of granting broad permissions to authenticated users and service accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-10-23T02:55:38.369Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6900c82a05cd0025c8e834e0
Added to database: 10/28/2025, 1:42:02 PM
Last enriched: 10/28/2025, 1:52:25 PM
Last updated: 10/28/2025, 6:31:12 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12422: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Azure Access Technology BLU-IC2
CriticalCVE-2025-61080: n/a
UnknownCVE-2025-60800: n/a
UnknownCVE-2025-60355: n/a
UnknownCVE-2025-60354: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.