RHSA-2025:23236

Vulnerability from csaf_redhat - Published: 2025-12-16 01:34 - Updated: 2025-12-18 09:15
Summary
Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes 1.0.0: new RHEL 9 container image security update

Notes

Topic
New Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9 container images are now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
New Red Hat Lightspeed (formerly Insights) for Runtimes 1.0.0 on RHEL 9 container images have been released, adding a variety of features and bug fixes. Users of Red Hat Insights for Runtimes on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images. Security Fix(es): * insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: Improper Proxy Configuration Allows Unauthorized Administrative Commands (CVE-2025-11393) You can find images updated by this advisory in Red Hat Container Catalog (see References).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "New Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9 container images are now available.\n\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "New Red Hat Lightspeed (formerly Insights) for Runtimes 1.0.0 on RHEL 9 container images have been released, adding a variety of features and bug fixes.\n\nUsers of Red Hat Insights for Runtimes on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.\n\nSecurity Fix(es):\n\n* insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: Improper Proxy Configuration Allows Unauthorized Administrative Commands (CVE-2025-11393)\n\nYou can find images updated by this advisory in Red Hat Container Catalog (see References).",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:23236",
        "url": "https://access.redhat.com/errata/RHSA-2025:23236"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-11393",
        "url": "https://access.redhat.com/security/cve/CVE-2025-11393"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23236.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes 1.0.0: new RHEL 9 container image security update",
    "tracking": {
      "current_release_date": "2025-12-18T09:15:16+00:00",
      "generator": {
        "date": "2025-12-18T09:15:16+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.14"
        }
      },
      "id": "RHSA-2025:23236",
      "initial_release_date": "2025-12-16T01:34:50+00:00",
      "revision_history": [
        {
          "date": "2025-12-16T01:34:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-12-16T01:34:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-12-18T09:15:16+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
                "product": {
                  "name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
                  "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:lightspeed_for_runtimes:1.0::el9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Lightspeed (formerly Insights) for Runtimes"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
                "product": {
                  "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
                  "product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1765483112"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
                "product": {
                  "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
                  "product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/runtimes-inventory-operator-bundle@sha256%3Ab5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1765833279"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64",
                "product": {
                  "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64",
                  "product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302?arch=arm64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1765483112"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
                "product": {
                  "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
                  "product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1765483112"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
                "product": {
                  "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
                  "product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453?arch=s390x\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1765483112"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
          "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64"
        },
        "product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
        "relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
          "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le"
        },
        "product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
        "relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
          "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64"
        },
        "product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
        "relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
          "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x"
        },
        "product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
        "relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
          "product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64"
        },
        "product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64",
        "relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-11393",
      "cwe": {
        "id": "CWE-441",
        "name": "Unintended Proxy or Intermediary (\u0027Confused Deputy\u0027)"
      },
      "discovery_date": "2025-10-07T02:22:07.614000+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2402032"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster\u0027s main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle.\n\nThis allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster\u0027s configuration or status on the Red Hat platform.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: Improper Proxy Configuration Allows Unauthorized Administrative Commands",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
          "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
          "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
          "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64"
        ],
        "known_not_affected": [
          "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-11393"
        },
        {
          "category": "external",
          "summary": "RHBZ#2402032",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402032"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-11393",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-11393"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11393",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11393"
        }
      ],
      "release_date": "2025-12-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-16T01:34:50+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:23236"
        },
        {
          "category": "workaround",
          "details": "Add the following to the Cryostat or JWS subscription YAML:\n\u003e spec:\n\u003e config:\n\u003e env:\n\u003e - name: INSIGHTS_ENABLED\n\u003e value: \"false\"\n\nThis will disable the affected proxy server. (Note: due to a separate\nissue, the above step will cause a crash loop in the Insights container\nfor the operator, but this is harmless).",
          "product_ids": [
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:b5f0ff2579eaa5f85452b009a2f7735238f87a05c3f7d503218807f0741c1a9f_amd64",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:08f473dec97e110a73e1c9886ee31512bb6937f87bdb95fbe77cb2d85695b936_ppc64le",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:0abc9cd56597eb0983b4c50704f7dca6736e745710ba627fafa0c892f250ed49_amd64",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:33ddc7c7c65374ab7b2b2c02f6319e52fe33904a9d951791cefcd72a39b66453_s390x",
            "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:72d4826d2f9da25cb841a0f71411ade99515d23efc13420f057cdc4f804f0302_arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: Improper Proxy Configuration Allows Unauthorized Administrative Commands"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…