Description
An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Published: 2020-09-16
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-6458 An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
History

No history.

Subscriptions

Istio-operator Project Istio-operator
Redhat Service Mesh
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T12:39:36.236Z

Reserved: 2020-06-17T00:00:00.000Z

Link: CVE-2020-14306

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-16T18:15:13.017

Modified: 2024-11-21T05:02:58.233

Link: CVE-2020-14306

cve-icon Redhat

Severity : Important

Publid Date: 2020-06-30T00:00:00Z

Links: CVE-2020-14306 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses