Impact
The flaw allows a non‑root user that can execute commands in an affected OpenShift Update Service image to exploit a group‑writable /etc/passwd file. By modifying this file the attacker can create a user with UID 0 and gain full root privileges inside the container, compromising confidentiality, integrity, and availability of the workloads running in that container. This vulnerability is a classic permission‑to‑grant escalation described by CWE‑276.
Affected Systems
The issue affects Red Hat OpenShift Update Service version 5, as identified by the vendor. Containers built from this image are vulnerable unless the /etc/passwd file is secured. No additional vendor or product variations are listed.
Risk and Exploitability
The CVSS score of 6.4 indicates medium severity, and the lack of an EPSS score suggests there is no current widespread exploitation data. The flaw requires that the attacker already has the ability to run commands inside the container, which is a non‑remote scenario. However, once inside, the attacker can elevate to root, making the impact severe for the affected namespace. Since the vulnerability is not listed in the CISA KEV catalog, it is likely not actively exploited yet, but the potential for full container compromise warrants prompt attention.
OpenCVE Enrichment