Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31761 | A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it. |
Solution
No solution given by the vendor.
Workaround
RHOAI versions 2.16.x The recommended fix is to upgrade to version 2.16.3. However, if Kueue features are not required, the Kueue component management state can be set to "Removed" in the RHOAI DataScienceCluster resource: ~~~ oc patch dsc default-dsc --type=merge -p='{"spec":{"components":{"kueue":{"managementState":"Removed"}}}}' -n redhat-ods-operator ~~~ RHOAI versions 2.19+ The recommended fix is to apply the available erratum. Alternatively, follow these steps: 1. Prevent the RHOAI operator from managing the kueue-batch-user-rolebinding by applying the necessary annotation: ~~~ oc patch clusterrolebinding kueue-batch-user-rolebinding -p '{"metadata":{"annotations": \{"opendatahub.io/managed":"false"}}}' ~~~ 2. Disable the ClusterRoleBinding by updating its subject to a different, non-existent, group: ~~~ oc patch clusterrolebinding kueue-batch-user-rolebinding \ -p '{ "subjects": [ { "kind": "Group", "name": "REPLACEME", "apiGroup": "rbac.authorization.k8s.io" } ] }' ~~~ It is important that the group used for the subject does not exist on the cluster to prevent the risk of unintentionally assigning these permissions to other non-privileged users. 3. Once updates providing fixes have been applied, it's recommended to remove the clusterrolebinding created in step 2 of the mitigation. ~~~ oc delete clusterrolebinding kueue-batch-user-rolebinding ~~~
Fri, 03 Oct 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Thu, 02 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 02 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 02 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ai:2.16::el8 cpe:/a:redhat:openshift_ai:2.22::el9 |
|
| References |
|
Wed, 01 Oct 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ai:2.19::el8 cpe:/a:redhat:openshift_ai:2.21::el9 |
|
| References |
|
Tue, 30 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it. |
| Title | openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin | Openshift-ai: overly permissive clusterrole allows authenticated users to escalate privileges to cluster admin |
| First Time appeared |
Redhat
Redhat openshift Ai |
|
| CPEs | cpe:/a:redhat:openshift_ai | |
| Vendors & Products |
Redhat
Redhat openshift Ai |
|
| References |
|
Tue, 30 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-06T14:14:40.017Z
Reserved: 2025-09-19T13:40:32.975Z
Link: CVE-2025-10725
Updated: 2025-09-30T18:32:37.705Z
Status : Awaiting Analysis
Published: 2025-09-30T18:15:47.900
Modified: 2025-10-02T19:12:17.160
Link: CVE-2025-10725
OpenCVE Enrichment
No data.
EUVD