MEDIUM · 6.8

CVE-2023-5056

A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in...

Vulnerability Description

A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.

CVSS Score

6.8

MEDIUM

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
RedhatService Interconnect1.0
RedhatEnterprise Linux9.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-5056?

CVE-2023-5056 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in...

How severe is CVE-2023-5056?

CVE-2023-5056 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-5056?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Service Interconnect, Redhat Enterprise Linux.