Impact
Early versions of Operator SDK used a script that set the permissions of /etc/passwd to 664 and owned the file by root group. This allowed any user with membership in the root group within a running container to modify the file and add a new user with UID 0, achieving full root privileges inside the container. The weakness is a misconfiguration of file permissions (CWE-276).
Affected Systems
The vulnerability affects operator images built with Operator SDK before 0.15.2 that still include the insecure user_setup script. This includes Red Hat OpenShift Container Platform, Advanced Cluster Management for Kubernetes, OpenShift Data Foundation, Advanced Cluster Security, OpenShift Virtualization, OpenShift Web Terminal, and other Red Hat products that support operator building with the affected SDK versions.
Risk and Exploitability
The CVSS score is 6.4 and the EPSS score is below 1 %, indicating a moderate severity and low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. An attacker must already be able to execute commands inside the container, which is typically achieved through container breakout or an initial compromise, to modify /etc/passwd and elevate privileges. The attack vector is therefore in‑container exploitation relying on improper file permissions.
OpenCVE Enrichment
EUVD
Github GHSA