CVE-2023-5056
low-risk
Published 2023-12-18
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10
Medium
ADJACENT_NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:6219
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-5056
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2239517
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:6219
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-5056
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2239517
27
/ 100
low-risk
Severity
22/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal