Metrics
Affected Vendors & Products
Mon, 23 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 23 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the Kubernetes NodeRestriction admission controller when the DynamicResourceAllocation feature is enabled. While this controller properly validates resource claims during pod status updates, it fails to apply the same validation during pod creation. This oversight allows a compromised node to create mirror pods that can access unauthorized dynamic resources, potentially leading to unauthorized data access and privilege escalation. Although kubelet sanity checks usually prevent such pods from running, the lack of authorization enforcement at creation time poses a real security policy failure. | A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. |
Title | kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass | Nodes can bypass dynamic resource allocation authorization checks |
Weaknesses | CWE-20 | |
References |
|
Sat, 21 Jun 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in the Kubernetes NodeRestriction admission controller when the DynamicResourceAllocation feature is enabled. While this controller properly validates resource claims during pod status updates, it fails to apply the same validation during pod creation. This oversight allows a compromised node to create mirror pods that can access unauthorized dynamic resources, potentially leading to unauthorized data access and privilege escalation. Although kubelet sanity checks usually prevent such pods from running, the lack of authorization enforcement at creation time poses a real security policy failure. |
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Jun 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: kubernetes
Published: 2025-06-23T15:38:42.258Z
Updated: 2025-06-23T15:58:05.106Z
Reserved: 2025-05-12T03:29:13.710Z
Link: CVE-2025-4563

Updated: 2025-06-23T15:57:08.938Z

Status : Awaiting Analysis
Published: 2025-06-23T16:15:27.350
Modified: 2025-06-23T20:16:21.633
Link: CVE-2025-4563
