Red Hat

Red Hat

A critical privilege escalation vulnerability (CVE-2025-10725, CVSS 9.9) was discovered in **Red Hat OpenShift AI**, a platform for managing AI/ML workloads across hybrid clouds. The flaw allows a low-privileged authenticated attacker (e.g., a data scientist with standard Jupyter notebook access) to escalate privileges to **full cluster administrator**, compromising the entire infrastructure. This enables theft of sensitive data, disruption of all hosted services, and complete takeover of the underlying systems—posing a **total breach risk** to the platform and its applications.Affected versions include **OpenShift AI 2.19, 2.21, and RHOAI**. While Red Hat classified it as *'Important'* (due to the authentication prerequisite), the impact is severe: attackers could **exfiltrate proprietary AI models, customer data, or internal research**, halt critical operations, or pivot to broader network infiltration. Mitigations involve restricting broad permissions (e.g., `kueue-batch-user-role` bindings) and enforcing least-privilege access for job creation. The vulnerability underscores risks in AI/ML infrastructure, where compromised environments could lead to **operational shutdowns, intellectual property theft, or cascading supply-chain attacks**.

Source: https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html

TPRM report: https://www.rankiteo.com/company/red-hat

"id": "red1694016100125",
"linkid": "red-hat",
"type": "Vulnerability",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Users of Red Hat OpenShift AI '
                                              '2.19, 2.21, and RHOAI',
                        'industry': 'Technology / Cloud Computing',
                        'location': 'Global',
                        'name': 'Red Hat',
                        'type': 'Organization (Software Vendor)'}],
 'attack_vector': 'Authenticated remote attacker exploiting improper '
                  'permission assignments in OpenShift AI',
 'customer_advisories': ['Restrict permissions as outlined in the advisory',
                         'Review access controls for data scientists and other '
                         'low-privilege roles'],
 'data_breach': {'data_exfiltration': 'Possible (if attacker steals sensitive '
                                      'data)',
                 'sensitivity_of_data': 'High (includes AI/ML models, training '
                                        'data, and operational data)',
                 'type_of_data_compromised': ['Sensitive data stored in '
                                              'OpenShift AI clusters',
                                              'Potentially all data hosted on '
                                              'the platform']},
 'description': 'A severe security flaw (CVE-2025-10725, CVSS 9.9) in Red Hat '
                'OpenShift AI allows authenticated low-privileged attackers '
                '(e.g., data scientists with standard Jupyter notebook access) '
                'to escalate privileges to full cluster administrator. This '
                'enables complete compromise of the cluster’s confidentiality, '
                'integrity, and availability, including theft of sensitive '
                'data, service disruption, and infrastructure takeover. '
                'Affected versions include Red Hat OpenShift AI 2.19, 2.21, '
                'and RHOAI. Mitigations include restricting broad permissions '
                'to system-level groups and adhering to the principle of least '
                'privilege for job creation permissions.',
 'impact': {'brand_reputation_impact': 'High (due to potential total breach of '
                                       'AI/ML platforms)',
            'data_compromised': ['Sensitive data hosted on the cluster'],
            'downtime': 'Potential total disruption of services',
            'operational_impact': 'Complete compromise of confidentiality, '
                                  'integrity, and availability',
            'systems_affected': ['Red Hat OpenShift AI clusters (versions '
                                 '2.19, 2.21, RHOAI)',
                                 'Jupyter notebook environments',
                                 'Underlying infrastructure and hosted '
                                 'applications']},
 'initial_access_broker': {'entry_point': 'Authenticated low-privilege account '
                                          '(e.g., data scientist with Jupyter '
                                          'notebook access)',
                           'high_value_targets': ['OpenShift AI cluster '
                                                  'administrator privileges',
                                                  'Underlying infrastructure '
                                                  'control']},
 'investigation_status': 'Disclosed; mitigations provided, no patch yet',
 'post_incident_analysis': {'corrective_actions': ['Remove broad '
                                                   '`ClusterRoleBinding` '
                                                   'associations',
                                                   'Implement least-privilege '
                                                   'access for job creation'],
                            'root_causes': ['Over-permissive '
                                            '`ClusterRoleBinding` for '
                                            '`system:authenticated` group',
                                            'Lack of granular permission '
                                            'controls for job creation']},
 'recommendations': ['Apply the principle of least privilege for all '
                     'permissions, especially job creation in OpenShift AI.',
                     'Audit and restrict `ClusterRoleBinding` associations to '
                     'prevent over-permissive access.',
                     'Monitor for unauthorized privilege escalation attempts '
                     'in AI/ML platforms.',
                     'Update to patched versions of OpenShift AI once '
                     'available.'],
 'references': [{'source': 'Red Hat Security Advisory'}],
 'response': {'communication_strategy': ['Public advisory released by Red Hat'],
              'containment_measures': ['Avoid granting broad permissions to '
                                       'system-level groups (e.g., '
                                       '`system:authenticated`)',
                                       'Remove or restrict the '
                                       '`ClusterRoleBinding` associating '
                                       '`kueue-batch-user-role` with '
                                       '`system:authenticated`'],
              'remediation_measures': ['Grant job creation permissions on a '
                                       'granular, as-needed basis',
                                       'Adhere to the principle of least '
                                       'privilege']},
 'stakeholder_advisories': ['Red Hat customers using OpenShift AI 2.19, 2.21, '
                            'or RHOAI'],
 'title': 'Critical Privilege Escalation Vulnerability in Red Hat OpenShift AI '
          '(CVE-2025-10725)',
 'type': 'Privilege Escalation / Vulnerability Exploitation',
 'vulnerability_exploited': 'CVE-2025-10725 (CVSS 9.9)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.