<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4740 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4740/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 15:17:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4740/feed.xml" rel="self" type="application/rss+xml"/><item><title>Red Hat Open Cluster Management (OCM) Cross-Cluster Privilege Escalation via Forged Certificates (CVE-2026-4740)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ocm-privesc/</link><pubDate>Tue, 07 Apr 2026 15:17:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ocm-privesc/</guid><description>CVE-2026-4740 describes a vulnerability in Red Hat Open Cluster Management (OCM) where improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge certificates, enabling cross-cluster privilege escalation.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-4740, exists within Red Hat Advanced Cluster Management (ACM), which utilizes Open Cluster Management (OCM) technology. This flaw stems from the improper validation of Kubernetes client certificate renewal requests. A malicious managed cluster administrator can exploit this vulnerability to forge a client certificate. This forged certificate, if approved by the OCM controller, grants the attacker elevated privileges across different clusters. The successful exploitation of this vulnerability can lead to an attacker gaining complete control over other managed clusters and potentially the central hub cluster, posing a significant threat to the entire ACM environment. This vulnerability impacts any environment utilizing Red Hat Advanced Cluster Management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A managed cluster administrator gains initial access to a managed Kubernetes cluster within the ACM environment.</li>
<li>The attacker crafts a malicious Kubernetes client certificate renewal request, exploiting the lack of proper validation in OCM.</li>
<li>The forged certificate request is submitted to the OCM controller for approval.</li>
<li>Due to insufficient validation, the OCM controller approves the forged client certificate.</li>
<li>The attacker uses the approved, forged certificate to authenticate to other managed clusters.</li>
<li>Using the forged certificate, the attacker escalates privileges within the targeted managed clusters.</li>
<li>The attacker leverages escalated privileges to move laterally across the cluster.</li>
<li>The attacker gains control of the targeted managed clusters, potentially including the central hub cluster, allowing for data exfiltration, service disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4740 can lead to complete compromise of the Red Hat Advanced Cluster Management environment. A malicious managed cluster administrator can leverage this vulnerability to gain control over other managed clusters, including the hub cluster. This allows for unauthorized access to sensitive data, disruption of critical services, and potential deployment of malicious workloads across the compromised clusters. The vulnerability has a CVSS v3.1 score of 8.2, indicating a high severity. The number of potential victims depends on the scope of ACM deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Red Hat Advanced Cluster Management (ACM) that addresses CVE-2026-4740 to remediate the improper certificate validation.</li>
<li>Implement stricter validation policies for Kubernetes client certificate renewal requests within your OCM environment to prevent the forging of certificates.</li>
<li>Monitor Kubernetes API server logs for suspicious certificate creation or approval activities, using the <code>title: &quot;Detect Suspicious Kubernetes Certificate Creation&quot;</code> Sigma rule provided below.</li>
<li>Implement Role-Based Access Control (RBAC) policies within your Kubernetes clusters to limit the privileges of managed cluster administrators and mitigate the impact of potential privilege escalation.</li>
<li>Monitor the OCM controller logs for certificate-related events as they relate to CVE-2026-4740.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>kubernetes</category><category>privilege-escalation</category><category>cve-2026-4740</category><category>ocm</category><category>acm</category></item></channel></rss>