Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3597 | A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster. |
Github GHSA |
GHSA-jhh6-6fhp-q2xp | Open Cluster Management vulnerable to Trust Boundary Violation |
Wed, 25 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-266 |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 18 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Dec 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | open-cluster-management-io/ocm: cluster-manager permissions may allow a worker node to obtain service account tokens | Open-cluster-management-io/ocm: cluster-manager permissions may allow a worker node to obtain service account tokens |
| First Time appeared |
Redhat
Redhat acm |
|
| CPEs | cpe:/a:redhat:acm:2 | |
| Vendors & Products |
Redhat
Redhat acm |
|
| References |
|
Sat, 12 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster. |
Fri, 11 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | open-cluster-management-io/ocm: cluster-manager permissions may allow a worker node to obtain service account tokens | |
| Weaknesses | CWE-268 CWE-501 |
|
| References |
|
|
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-25T20:19:36.555Z
Reserved: 2024-10-10T03:51:08.007Z
Link: CVE-2024-9779
Updated: 2024-12-18T15:15:25.394Z
Status : Deferred
Published: 2024-12-17T23:15:05.603
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-9779
OpenCVE Enrichment
No data.
EUVD
Github GHSA