A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
History

Mon, 23 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the Kubernetes NodeRestriction admission controller when the DynamicResourceAllocation feature is enabled. While this controller properly validates resource claims during pod status updates, it fails to apply the same validation during pod creation. This oversight allows a compromised node to create mirror pods that can access unauthorized dynamic resources, potentially leading to unauthorized data access and privilege escalation. Although kubelet sanity checks usually prevent such pods from running, the lack of authorization enforcement at creation time poses a real security policy failure. A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
Title kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass Nodes can bypass dynamic resource allocation authorization checks
Weaknesses CWE-20
References

Sat, 21 Jun 2025 02:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in the Kubernetes NodeRestriction admission controller when the DynamicResourceAllocation feature is enabled. While this controller properly validates resource claims during pod status updates, it fails to apply the same validation during pod creation. This oversight allows a compromised node to create mirror pods that can access unauthorized dynamic resources, potentially leading to unauthorized data access and privilege escalation. Although kubelet sanity checks usually prevent such pods from running, the lack of authorization enforcement at creation time poses a real security policy failure.
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}

threat_severity

Moderate

cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Low


Fri, 20 Jun 2025 02:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass
Weaknesses CWE-863
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published: 2025-06-23T15:38:42.258Z

Updated: 2025-06-23T15:58:05.106Z

Reserved: 2025-05-12T03:29:13.710Z

Link: CVE-2025-4563

cve-icon Vulnrichment

Updated: 2025-06-23T15:57:08.938Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-23T16:15:27.350

Modified: 2025-06-23T20:16:21.633

Link: CVE-2025-4563

cve-icon Redhat

Severity : Low

Publid Date: 2025-06-19T00:00:00Z

Links: CVE-2025-4563 - Bugzilla