<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openshift — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/openshift/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/openshift/feed.xml" rel="self" type="application/rss+xml"/><item><title>Red Hat OpenShift AI odh-dashboard Kubernetes Token Disclosure (CVE-2026-5483)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openshift-token-disclosure/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openshift-token-disclosure/</guid><description>CVE-2026-5483 is a high-severity vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) that allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint, potentially leading to unauthorized access to Kubernetes resources.</description><content:encoded><![CDATA[<p>A vulnerability, CVE-2026-5483, has been identified in the <code>odh-dashboard</code> component of Red Hat OpenShift AI (RHOAI). This flaw allows for the unintended disclosure of Kubernetes Service Account tokens via a NodeJS endpoint. Discovered in April 2026, the vulnerability stems from the insertion of sensitive information into sent data. An attacker with knowledge of the vulnerable endpoint can potentially exploit this to gain unauthorized access to Kubernetes resources within the affected OpenShift environment. This poses a significant risk, particularly in environments where OpenShift AI is used to manage sensitive data or critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Red Hat OpenShift AI instance running the vulnerable <code>odh-dashboard</code> component.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable NodeJS endpoint responsible for handling Kubernetes Service Account tokens.</li>
<li>The vulnerable endpoint processes the request without proper sanitization or access controls.</li>
<li>The Kubernetes Service Account token is inadvertently included in the response data due to the CWE-201 vulnerability (Insertion of Sensitive Information Into Sent Data).</li>
<li>The attacker intercepts or captures the response containing the leaked Kubernetes Service Account token.</li>
<li>The attacker uses the compromised Kubernetes Service Account token to authenticate to the Kubernetes API.</li>
<li>The attacker enumerates the Kubernetes cluster to identify potential targets and resources.</li>
<li>The attacker leverages the compromised Service Account privileges to access sensitive data, modify configurations, or deploy malicious workloads within the Kubernetes cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5483 can lead to unauthorized access to Kubernetes resources within a Red Hat OpenShift AI environment. The disclosure of Kubernetes Service Account tokens allows an attacker to bypass authentication controls and potentially gain complete control over the cluster. This could result in data breaches, service disruptions, and the deployment of malicious applications, affecting all users and applications relying on the compromised OpenShift AI instance. The severity is high, with a CVSS v3.1 base score of 8.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by Red Hat via RHSA-2026:7397 to remediate the vulnerability in <code>odh-dashboard</code>.</li>
<li>Monitor web server logs for suspicious requests targeting NodeJS endpoints associated with <code>odh-dashboard</code> using the &ldquo;Detect OpenShift Token Disclosure Attempt&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the impact of a potential compromise and restrict access to sensitive Kubernetes resources.</li>
<li>Enable and review Kubernetes audit logs to detect unauthorized activity performed by compromised service accounts.</li>
<li>Rotate Kubernetes Service Account tokens regularly to minimize the window of opportunity for an attacker to exploit leaked credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openshift</category><category>kubernetes</category><category>token-disclosure</category><category>cve-2026-5483</category></item><item><title>Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</link><pubDate>Fri, 27 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</guid><description>CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.</description><content:encoded>&lt;p>A vulnerability, CVE-2025-12805, has been identified in Red Hat OpenShift AI (RHOAI) llama-stack-operator. The vulnerability stems from the lack of NetworkPolicy restrictions on the llama-stack service endpoint. This allows a user within one namespace to bypass intended isolation and directly access Llama Stack services deployed in other namespaces. The vulnerability was published on March 26, 2026. Successful exploitation could lead to unauthorized data access and manipulation, impacting the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openshift</category><category>kubernetes</category><category>networkpolicy</category><category>unauthorized-access</category></item><item><title>Red Hat OpenShift GitOps Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-openshift-gitops-vulns/</link><pubDate>Wed, 25 Mar 2026 10:21:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openshift-gitops-vulns/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.</description><content:encoded><![CDATA[<p>Red Hat OpenShift GitOps is susceptible to multiple vulnerabilities that can be exploited by an anonymous remote attacker. The vulnerabilities can lead to data manipulation, misrepresentation of information, or a denial-of-service condition. Given the widespread adoption of OpenShift in cloud environments, these vulnerabilities pose a significant risk to organizations relying on the platform for application deployment and management. Successful exploitation could lead to unauthorized modification of application configurations, leading to compromised deployments and potentially impacting service availability. Defenders should prioritize patching and implementing mitigations to prevent exploitation of these vulnerabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Red Hat OpenShift GitOps instance accessible remotely.</li>
<li>The attacker exploits a vulnerability allowing for unauthenticated access to sensitive data within the GitOps system.</li>
<li>The attacker leverages another vulnerability to inject malicious code into the GitOps configuration.</li>
<li>The injected code is then used to modify application deployment parameters.</li>
<li>The modified parameters lead to the deployment of compromised application versions.</li>
<li>Alternatively, the attacker exploits a denial-of-service vulnerability to disrupt the GitOps service.</li>
<li>The disrupted service prevents legitimate application deployments or updates.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in Red Hat OpenShift GitOps can lead to data manipulation, where critical application configurations are altered without authorization. Information can be misrepresented, leading to incorrect operational decisions. A denial of service can disrupt application deployments and updates, impacting service availability. The impact depends on the specific vulnerabilities exploited and the target environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review Red Hat&rsquo;s security advisories for specific CVEs related to OpenShift GitOps and apply necessary patches immediately (references).</li>
<li>Implement network segmentation to limit remote access to OpenShift GitOps instances (network_connection).</li>
<li>Monitor OpenShift GitOps logs for suspicious activity, such as unauthorized configuration changes or access attempts (file_event, process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openshift</category><category>gitops</category><category>vulnerability</category><category>cloud</category></item></channel></rss>