Impact
A flaw was discovered in Red Hat OpenShift AI Service where the TrustyAI component incorrectly grants all authenticated users and service accounts cluster‑wide permissions to retrieve, list, and watch any pod, persistent volume claim and lmevaljob in any namespace. This unauthorized access violates the principle of least privilege and enables users to leak pod metadata and volume information that could be used for further attacks or to identify sensitive workloads.
Affected Systems
Red Hat OpenShift AI, including the 2.25 and 3.0 releases available on Red Hat Enterprise Linux 9. All versions mentioned in the CNA product list are affected.
Risk and Exploitability
The CVSS score is 5, indicating a moderate impact, while the EPSS score is below 1 % and the vulnerability is not currently listed in CISA KEV. The flaw requires only authenticated access; any cluster user or service account can exploit it by querying the Kubernetes API to enumerate pods, persistent volume claims and LMEval jobs across namespaces. Once credentials are available, the attack is straightforward and carries a low exploitation probability but potentially broad information disclosure.
OpenCVE Enrichment