Cyber Security News

Red Hat Openshift AI Service Vulnerability Lets Attackers Take Full Control of Cloud Infrastructure

Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable low-privileged attackers to elevate their permissions to full cluster administrator and compromise the entire platform. 

With a CVSS v3 base score of 9.9, this vulnerability poses a critical risk for organizations leveraging Red Hat OpenShift AI for machine learning workloads.

Privilege Escalation Vulnerability (CVE-2025-10725)

The root cause of CVE-2025-10725 lies in an overly permissive ClusterRoleBinding associating the kueue-batch-user-role with the system:authenticated group. 

In typical deployments, data scientists and other authenticated users access Jupyter notebooks and AI pipeline features with minimal privileges. 

However, by exploiting this misconfiguration, an attacker can invoke the batch.kueue.openshift.io API to create arbitrary Job and Pod resources.

Inject malicious containers or init-containers that execute oc or kubectl commands, chain privilege elevation within the cluster by binding newly created service accounts to higher-privilege roles.

Ultimately, assume the cluster-admin role and gain unrestricted read/write access to all cluster objects. This exploit completely undermines the confidentiality, integrity, and availability of hosted workloads, allowing theft of sensitive data, service disruption, and full infrastructure takeover.

Risk FactorsDetails
Affected ProductsRed Hat OpenShift AI 2.19 (RHEL 8)Red Hat OpenShift AI 2.21 (RHEL 9)registry.redhat.io/rhoai/odh-rhel8-operatorregistry.redhat.io/rhoai/odh-rhel9-operator
ImpactPrivilege escalation
Exploit PrerequisitesValid authenticated user accountAccess to OpenShift AI ServiceLow-privileged account, Access to Jupyter notebook or similar interface, Ability to interact with batch.kueue.openshift.io API
CVSS 3.1 Score9.9 (Critical)

Mitigations

Red Hat has released fixes in the following errata, updating the OpenShift AI Operator for Red Hat Enterprise Linux 8 and 9:

  • RHBA-2025:16984 (OpenShift AI 2.19 on RHEL 8)
  • RHBA-2025:16983 (OpenShift AI 2.21 on RHEL 9)

Administrators should apply these updates immediately. As a workaround before patching, remove the problematic ClusterRoleBinding:

Then, grant job-creation permissions explicitly to trusted identities. This approach enforces the Principle of Least Privilege, ensuring only designated users or groups can submit AI jobs.

Red Hat classifies CVE-2025-10725 as Important rather than Critical because the attacker must hold a valid authenticated account, albeit with low privileges.

Nonetheless, the impact remains severe. Organizations running Red Hat OpenShift AI should remediate promptly to prevent complete cluster compromise and adhere to hardened RBAC configurations going forward.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Florence Nightingale

Florence Nightingale is a senior security and privacy reporter, covering data breaches, cybercrime, malware, and data leaks from cyber space daily.

Recent Posts

Top 10 Best Supply Chain Intelligence Security Companies in 2025

The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber…

15 minutes ago

Scattered LAPSUS$ Hunters Announced Salesforce Breach List On New Onion Site

A cybercrime collective known as Scattered LAPSUS$ Hunters has launched a new data leak site…

48 minutes ago

Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data

Renault UK has notified customers of a data breach after a cyberattack on one of…

1 hour ago

Top 10 Best Fraud Prevention Companies in 2025

In 2025, digital transactions are at an all-time high, but so are the risks of…

2 hours ago

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps

In recent months, security teams have observed a surge in Android spyware campaigns that prey…

4 hours ago

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical…

4 hours ago