
We found results for “”
CVE-2025-4563
Good to know:

Date: June 23, 2025
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. This affects kubernetes v1.32.x before v1.32.6 and v1.33.x before v1.33.2.
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version k8s.io/kubernetes - v1.32.6;k8s.io/kubernetes - v1.33.2;https://github.com/kubernetes/kubernetes.git - v1.32.6;https://github.com/kubernetes/kubernetes.git - v1.33.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | HIGH |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | LOW |