๐Ÿ” CVE Alert

CVE-2024-4369

MEDIUM 6.8

Cluster-image-registry-operator: exposes a secret via env variable in pod definition on azure

CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th

An information disclosure flaw was found in OpenShift's internal image registry operator. The AZURE_CLIENT_SECRET can be exposed through an environment variable defined in the pod definition, but is limited to Azure environments. An attacker controlling an account that has high enough permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.

CWE CWE-526
Published Apr 30, 2024
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3881 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3889 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-4369 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2278035