Impact
NVIDIA KAI Scheduler allows an attacker to reference pods across namespaces without sufficient authorization checks, potentially enabling unauthorized modification of pod data. The vulnerability is classified under CWE-863, which denotes improper authorization. A successful exploitation could allow a malicious actor to tamper with data in cross‑namespace pod interactions, threatening data integrity within the affected system.
Affected Systems
The affected product is NVIDIA KAI Scheduler. No specific version information is supplied, so all builds or releases of this scheduler are considered potentially susceptible until vendor guidance is provided.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, and the EPSS score is not available, suggesting limited public awareness of exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no known weaponized exploits at the time of this analysis. Likely attack vector requires internal cluster access or privileged interaction with the scheduler API; an attacker would need to craft pod references that span namespaces. The risk remains primarily to data integrity rather than availability or confidentiality.
OpenCVE Enrichment