icon

We found results for “

CVE-2025-4563

Good to know:

icon

Date: June 23, 2025

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. This affects kubernetes v1.32.x before v1.32.6 and v1.33.x before v1.33.2.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Authorization

CWE-285

Improper Input Validation

CWE-20

Incorrect Authorization

CWE-863

Top Fix

icon

Upgrade Version

Upgrade to version k8s.io/kubernetes - v1.32.6;k8s.io/kubernetes - v1.33.2;https://github.com/kubernetes/kubernetes.git - v1.32.6;https://github.com/kubernetes/kubernetes.git - v1.33.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): LOW

Do you need more information?

Contact Us