7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%
A flaw was found in OpenShift’s Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue (“iss”) check during JSON web token (JWT) authentication.
[
{
"vendor": "Red Hat",
"product": "Logging Subsystem for Red Hat OpenShift",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "openshift-logging/opa-openshift-rhel8",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/a:redhat:logging:5"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat OpenShift Container Platform 4",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "openshift4/ose-telemeter",
"defaultStatus": "affected",
"cpes": [
"cpe:/a:redhat:openshift:4"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat OpenShift distributed tracing 2",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "rhosdt/tempo-gateway-opa-rhel8",
"defaultStatus": "affected",
"cpes": [
"cpe:/a:redhat:openshift_distributed_tracing:2"
]
}
]
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%