CVE-2025-3528: Incorrect Default Permissions
A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.
AI Analysis
Technical Summary
CVE-2025-3528 identifies a critical security flaw in the Mirror Registry component of Red Hat OpenShift, specifically within the quay-app container. The vulnerability arises because the quay-app container is shipped with incorrect default permissions that allow write access to the /etc/passwd file, a critical system file that manages user account information. This misconfiguration enables a malicious actor who has access to the container to modify the passwd file, effectively allowing them to escalate their privileges to root within the pod. The vulnerability is classified with a CVSS 3.1 score of 8.2, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the impact extends beyond the vulnerable component to other resources. The impact includes high confidentiality, integrity, and availability consequences, as root access within the pod can lead to unauthorized data access, modification, and potential disruption of services. Although no known exploits are reported in the wild, the flaw poses a significant risk in environments where attackers can gain container access, such as through compromised credentials or other vulnerabilities. The flaw affects all versions of the Mirror Registry component as shipped with OpenShift at the time of disclosure. This vulnerability highlights the importance of secure default permissions in containerized environments and the risks of privilege escalation within Kubernetes pods.
Potential Impact
The vulnerability allows attackers with container access to escalate privileges to root within the pod, compromising confidentiality, integrity, and availability of containerized workloads. Root access inside the pod can enable attackers to manipulate application data, bypass security controls, and potentially pivot to other parts of the cluster if combined with other vulnerabilities or misconfigurations. This can lead to data breaches, service disruptions, and loss of trust in the affected systems. Organizations relying on Red Hat OpenShift with the Mirror Registry component are at risk of targeted attacks, especially in multi-tenant or shared environments where container isolation is critical. The flaw could be exploited by insiders or external attackers who have gained limited access, amplifying the threat. Although no exploits are currently known in the wild, the high severity and ease of exploitation under certain conditions make this a critical issue to address promptly.
Mitigation Recommendations
1. Immediately apply any patches or updates released by Red Hat addressing CVE-2025-3528 once available. 2. Until patches are available, restrict access to the quay-app container by enforcing strict RBAC policies and network segmentation to minimize the risk of unauthorized container access. 3. Implement container runtime security tools that monitor and alert on unauthorized file modifications, especially to critical files like /etc/passwd. 4. Use Pod Security Policies or OpenShift Security Context Constraints to enforce least privilege and prevent containers from running with unnecessary permissions. 5. Regularly audit container configurations and permissions to detect insecure defaults or deviations from best practices. 6. Employ multi-factor authentication and strong credential management to reduce the risk of initial container access by attackers. 7. Consider using container image scanning tools to detect insecure configurations before deployment. 8. Monitor logs and container behavior for signs of privilege escalation attempts or suspicious activity within pods.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Canada, Australia, India, South Korea, Netherlands
CVE-2025-3528: Incorrect Default Permissions
Description
A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-3528 identifies a critical security flaw in the Mirror Registry component of Red Hat OpenShift, specifically within the quay-app container. The vulnerability arises because the quay-app container is shipped with incorrect default permissions that allow write access to the /etc/passwd file, a critical system file that manages user account information. This misconfiguration enables a malicious actor who has access to the container to modify the passwd file, effectively allowing them to escalate their privileges to root within the pod. The vulnerability is classified with a CVSS 3.1 score of 8.2, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the impact extends beyond the vulnerable component to other resources. The impact includes high confidentiality, integrity, and availability consequences, as root access within the pod can lead to unauthorized data access, modification, and potential disruption of services. Although no known exploits are reported in the wild, the flaw poses a significant risk in environments where attackers can gain container access, such as through compromised credentials or other vulnerabilities. The flaw affects all versions of the Mirror Registry component as shipped with OpenShift at the time of disclosure. This vulnerability highlights the importance of secure default permissions in containerized environments and the risks of privilege escalation within Kubernetes pods.
Potential Impact
The vulnerability allows attackers with container access to escalate privileges to root within the pod, compromising confidentiality, integrity, and availability of containerized workloads. Root access inside the pod can enable attackers to manipulate application data, bypass security controls, and potentially pivot to other parts of the cluster if combined with other vulnerabilities or misconfigurations. This can lead to data breaches, service disruptions, and loss of trust in the affected systems. Organizations relying on Red Hat OpenShift with the Mirror Registry component are at risk of targeted attacks, especially in multi-tenant or shared environments where container isolation is critical. The flaw could be exploited by insiders or external attackers who have gained limited access, amplifying the threat. Although no exploits are currently known in the wild, the high severity and ease of exploitation under certain conditions make this a critical issue to address promptly.
Mitigation Recommendations
1. Immediately apply any patches or updates released by Red Hat addressing CVE-2025-3528 once available. 2. Until patches are available, restrict access to the quay-app container by enforcing strict RBAC policies and network segmentation to minimize the risk of unauthorized container access. 3. Implement container runtime security tools that monitor and alert on unauthorized file modifications, especially to critical files like /etc/passwd. 4. Use Pod Security Policies or OpenShift Security Context Constraints to enforce least privilege and prevent containers from running with unnecessary permissions. 5. Regularly audit container configurations and permissions to detect insecure defaults or deviations from best practices. 6. Employ multi-factor authentication and strong credential management to reduce the risk of initial container access by attackers. 7. Consider using container image scanning tools to detect insecure configurations before deployment. 8. Monitor logs and container behavior for signs of privilege escalation attempts or suspicious activity within pods.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-04-11T18:46:42.874Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7a5c
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 2/27/2026, 1:36:49 PM
Last updated: 3/27/2026, 10:12:19 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.