Severe Privilege Escalation Flaw Found in Red Hat OpenShift AI

  • A high-severity security flaw was found in Red Hat OpenShift AI.
  • The flaw allows authenticated, low-privileged users to gain full administrative control over the system.
  • The issue carries a CVSS score of 9.9 out of 10, indicating critical potential impact.
  • Vulnerable versions include Red Hat OpenShift AI 2.19, 2.21, and RHOAI.
  • Red Hat advises restricting broad permissions and applying the principle of least privilege for job creation rights.

A significant security vulnerability was disclosed on October 1, 2025, affecting the Red Hat OpenShift AI platform. This flaw permits attackers with an authenticated account to escalate their privileges and potentially control the entire underlying infrastructure.

- Advertisement -

The vulnerability, designated as CVE-2025-10725, has a CVSS (Common Vulnerability Scoring System) rating of 9.9 out of 10, illustrating a near-critical risk level. Red Hat classified the issue as “Important” rather than “Critical” due to the requirement that the attacker must already possess valid user credentials.

According to Red Hat, “A low-privileged attacker with access to an authenticated account, for example, as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator.” This escalation could lead to complete compromise of the cluster’s confidentiality, integrity, and availability. Attackers may steal sensitive data, disrupt services, and take over the entire infrastructure, resulting in full platform and application breaches.

Affected software versions include Red Hat OpenShift AI 2.19, 2.21, and Red Hat OpenShift AI (RHOAI). The platform helps users manage Artificial Intelligence models across hybrid cloud environments, supporting tasks like data preparation, model training, and monitoring.

To mitigate this issue, Red Hat recommends avoiding broad permission grants to system-level groups. Specifically, it advises against associating the kueue-batch-user-role with the system:authenticated group via ClusterRoleBinding. Permissions to create jobs should be assigned more carefully and only to users or groups that need them, following the principle of least privilege.

- Advertisement -

For more details, users can visit the official security advisory on the Red Hat website here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

SEC Drops Gemini Suit After $40M Push to Restore Earn Today!

SEC civil suit against Gemini Trust Company and Genesis Global Capital dismissed with prejudice...

DeFi surge, three hacks and MEV bot returns majority funds!!

Three separate DeFi attacks this week drained millions and prompted on-chain recovery efforts.Makina reported...

BitGo shares tumble 22% after $212M IPO; dip below $15 at 2B

BitGo shares fell nearly 22% on the second trading day after its IPO debut...

Intel Slides 17% After Q1 Guidance Miss; Supply Constraints.

INTC shares fell more than 17% on Friday after a quarterly report and weak...

Gold’s FOMO Drains Bitcoin: Prices Falling, Metals Rise Soon

The author argues that Bitcoin prices are likely to weaken because fewer groups need...
- Advertisement -

Must Read

Top 10 Best DeFi Tokens to Invest in 2022

Decentralized Finance (Defi), is one of the most talked-about topics in the crypto space alongside NFTs. So if you want to know the best...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!