Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3619 | A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod. |
Github GHSA |
GHSA-wgqq-9qh8-wvqv | OpenShift Hive RCE through AWS/Kubernetes client configuration leads to privilege escalation |
Thu, 06 Feb 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 31 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Dec 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod. | |
| Title | Openshift-dedicated: hive: rce through aws/kubernetes client configuration leads to privilege escalation | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-27T13:01:11.634Z
Reserved: 2024-02-05T18:35:14.363Z
Link: CVE-2024-25133
Updated: 2024-12-31T14:55:50.376Z
Status : Deferred
Published: 2024-12-31T15:15:08.283
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-25133
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA