Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12103: Incorrect Privilege Assignment in Red Hat Red Hat OpenShift AI (RHOAI)

0
Medium
VulnerabilityCVE-2025-12103cvecve-2025-12103
Published: Tue Oct 28 2025 (10/28/2025, 13:31:59 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift AI (RHOAI)

Description

A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`

AI-Powered Analysis

AILast updated: 10/28/2025, 13:52:25 UTC

Technical Analysis

CVE-2025-12103 is a vulnerability identified in the TrustyAI component of Red Hat OpenShift AI (RHOAI). The issue arises from an incorrect privilege assignment where a role named `trustyai-service-operator-lmeval-user-role` and a cluster role binding `trustyai-service-operator-default-lmeval-user-rolebinding` are created and bound to the `system:authenticated` group. This group includes every authenticated user and service account on the cluster, effectively granting them permissions to get, list, and watch any pod in any namespace. Furthermore, the vulnerability extends access to all persistent volume claims (PVCs) and lmevaljobs, which are custom resources related to AI model evaluation jobs. This misconfiguration results in an information disclosure vulnerability, allowing unauthorized users to enumerate pods and PVCs cluster-wide. While it does not permit modification or deletion of resources, the exposure of resource metadata and state can facilitate reconnaissance and subsequent attacks. The vulnerability has a CVSS 3.1 base score of 5.0 (medium severity), with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and a scope change since it affects cluster-wide resources. No patches or exploits are currently reported, but the flaw is publicly disclosed and should be addressed promptly to prevent misuse.

Potential Impact

For European organizations leveraging Red Hat OpenShift AI, this vulnerability can lead to unauthorized information disclosure about cluster workloads and storage resources. Attackers or malicious insiders with any authenticated access can enumerate pods and persistent volume claims across all namespaces, potentially revealing sensitive application details, deployment patterns, or data storage configurations. This information can be leveraged to identify high-value targets, plan lateral movement, or exploit other vulnerabilities. Although the vulnerability does not allow direct modification or disruption of resources, the confidentiality impact is significant in environments handling sensitive AI workloads or regulated data. The exposure of lmevaljobs could reveal proprietary AI model evaluation processes. Organizations in sectors such as finance, healthcare, and critical infrastructure, which often deploy AI workloads on OpenShift, may face increased risk. The medium severity rating reflects the balance between ease of exploitation (authenticated access required) and the impact limited to information disclosure without integrity or availability compromise.

Mitigation Recommendations

To mitigate CVE-2025-12103, organizations should first audit the cluster role bindings and roles created by the TrustyAI component, specifically the `trustyai-service-operator-lmeval-user-role` and `trustyai-service-operator-default-lmeval-user-rolebinding`. Immediate steps include removing or restricting the cluster role binding from the `system:authenticated` group to limit permissions only to necessary service accounts or users. Implement the principle of least privilege by creating dedicated roles for TrustyAI components with narrowly scoped permissions. Monitor and log access to pods, persistent volume claims, and lmevaljobs to detect unusual enumeration activity. If available, apply vendor patches or updates from Red Hat addressing this issue as soon as they are released. Additionally, enforce strong authentication and authorization controls on the OpenShift cluster, including network segmentation and RBAC policies that prevent broad access to sensitive resources. Regularly review and tighten cluster-wide permissions and consider using admission controllers or policy enforcement tools (e.g., Open Policy Agent) to prevent overly permissive role bindings. Finally, educate cluster administrators about the risks of granting broad permissions to authenticated users and service accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-23T02:55:38.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6900c82a05cd0025c8e834e0

Added to database: 10/28/2025, 1:42:02 PM

Last enriched: 10/28/2025, 1:52:25 PM

Last updated: 10/28/2025, 6:31:12 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats