Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12805: Improper Isolation or Compartmentalization in Red Hat Red Hat OpenShift AI 2.25

0
High
VulnerabilityCVE-2025-12805cvecve-2025-12805
Published: Thu Mar 26 2026 (03/26/2026, 21:48:16 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift AI 2.25

Description

CVE-2025-12805 is a high-severity vulnerability in Red Hat OpenShift AI 2. 25 affecting the llama-stack-operator component. It arises from improper network isolation, allowing unauthorized users in one Kubernetes namespace to access Llama Stack services in other namespaces due to missing NetworkPolicy restrictions. This flaw enables potential unauthorized viewing or manipulation of sensitive data across namespace boundaries. Exploitation requires at least limited privileges (PR:L) but no user interaction and can be performed remotely over the network. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using Red Hat OpenShift AI should prioritize implementing strict network segmentation policies and monitor inter-namespace traffic to mitigate risk. Countries with significant OpenShift AI deployments and critical AI workloads are most at risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:15:34 UTC

Technical Analysis

CVE-2025-12805 identifies a critical security flaw in Red Hat OpenShift AI version 2.25, specifically within the llama-stack-operator component responsible for managing Llama Stack AI services. The vulnerability stems from the absence of NetworkPolicy enforcement on the llama-stack service endpoint, which normally restricts network traffic between Kubernetes namespaces. Without these restrictions, a user or process with access to one namespace can send direct network requests to the llama-stack services deployed in other namespaces. This improper isolation or compartmentalization violates the principle of least privilege and namespace boundary enforcement in Kubernetes environments. As a result, an attacker with limited privileges in one namespace can access, view, or manipulate sensitive data belonging to other tenants or teams sharing the same OpenShift cluster. The CVSS 3.1 score of 8.1 reflects high severity, with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). Although no public exploits are currently known, the vulnerability poses a significant risk in multi-tenant or shared cluster environments where strict network segmentation is critical. The flaw highlights the importance of enforcing Kubernetes NetworkPolicies or equivalent network segmentation controls to prevent lateral movement and unauthorized cross-namespace access in container orchestration platforms.

Potential Impact

The primary impact of CVE-2025-12805 is unauthorized cross-namespace access within Red Hat OpenShift AI clusters, which can lead to exposure and potential manipulation of sensitive AI model data, configurations, or user information. This compromises confidentiality and integrity of data across tenants or teams sharing the same cluster. In environments where AI workloads process proprietary or regulated data, such breaches could result in intellectual property theft, data leakage, or compliance violations. The vulnerability does not affect availability, so denial-of-service is not a concern here. However, the ease of exploitation due to lack of network restrictions and the potential for privilege escalation within namespaces make it a critical risk for organizations relying on OpenShift AI for multi-tenant AI deployments. Attackers could leverage this flaw to pivot laterally, escalate privileges, or undermine trust in AI service isolation. The impact is especially severe for cloud service providers, enterprises with shared AI infrastructure, and organizations handling sensitive AI workloads.

Mitigation Recommendations

To mitigate CVE-2025-12805, organizations should immediately implement strict Kubernetes NetworkPolicies that explicitly restrict network traffic to the llama-stack service endpoints, ensuring that only authorized namespaces or pods can communicate with these services. Network segmentation should be enforced at the cluster level to prevent unauthorized cross-namespace access. Additionally, review and tighten Role-Based Access Control (RBAC) permissions to limit the ability of users or service accounts to access or modify network policies and AI service configurations. Employ network monitoring and anomaly detection tools to identify unusual inter-namespace traffic patterns indicative of exploitation attempts. Where possible, upgrade to patched versions of Red Hat OpenShift AI once available. Until patches are released, consider isolating critical AI workloads in dedicated clusters or namespaces with enhanced security controls. Regularly audit cluster network policies and configurations to ensure compliance with security best practices. Finally, educate DevOps and security teams about the risks of improper network isolation in containerized AI environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-06T13:48:05.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c25

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 3/26/2026, 10:15:34 PM

Last updated: 3/27/2026, 5:26:11 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses