Red Hat Advanced Cluster Management Kubernetes
By the Year
In 2024 there have been 0 vulnerabilities in Red Hat Advanced Cluster Management Kubernetes . Last year Advanced Cluster Management Kubernetes had 4 security vulnerabilities published. Right now, Advanced Cluster Management Kubernetes is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 4 | 7.65 |
2022 | 1 | 6.50 |
2021 | 0 | 0.00 |
2020 | 2 | 5.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Advanced Cluster Management Kubernetes vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Advanced Cluster Management Kubernetes Security Vulnerabilities
The HTTP/2 protocol
CVE-2023-44487
7.5 - High
- October 10, 2023
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Resource Exhaustion
A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions
CVE-2022-3248
7.5 - High
- October 05, 2023
A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.
AuthZ
The grc-policy-propagator allows security escalation within the cluster
CVE-2023-3027
7.8 - High
- June 05, 2023
The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.
Improper Privilege Management
RHACM: unauthenticated SSRF in console API endpoint
CVE-2022-3841
7.8 - High
- January 13, 2023
RHACM: unauthenticated SSRF in console API endpoint. A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauthenticated users making requests.
XSPA
A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend
CVE-2022-2238
6.5 - Medium
- September 01, 2022
A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.
SQL Injection
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0
CVE-2020-25688
3.5 - Low
- November 23, 2020
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a cluster, they could use the private key to decode API requests that should be protected by TLS sessions, potentially obtaining information they would not otherwise be able to. These certificates are not used for service authentication, so no opportunity for impersonation or active MITM attacks were made possible.
Use of Hard-coded Credentials
An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions
CVE-2020-25655
6.5 - Medium
- November 09, 2020
An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Advanced Cluster Management Kubernetes or by Red Hat? Click the Watch button to subscribe.