A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle.

This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Add the following to the Cryostat or JWS subscription YAML: > spec: > config: > env: > - name: INSIGHTS_ENABLED > value: "false" This will disable the affected proxy server. (Note: due to a separate issue, the above step will cause a crash loop in the Insights container for the operator, but this is harmless).

History

Tue, 16 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.
Title Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands
First Time appeared Redhat
Redhat insights-runtimes
Weaknesses CWE-441
CPEs cpe:/a:redhat:insights-runtimes:1
Vendors & Products Redhat
Redhat insights-runtimes
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-12-15T19:18:11.008Z

Reserved: 2025-10-07T02:24:57.427Z

Link: CVE-2025-11393

cve-icon Vulnrichment

Updated: 2025-12-15T18:06:17.976Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-15T17:15:51.870

Modified: 2025-12-15T18:22:13.783

Link: CVE-2025-11393

cve-icon Redhat

Severity : Important

Publid Date: 2025-12-15T00:00:00Z

Links: CVE-2025-11393 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses