We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4563

Nodes can bypass dynamic resource allocation authorization checks



Description

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

Reserved 2025-05-12 | Published 2025-06-23 | Updated 2025-06-23 | Assigner kubernetes


LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

v1.32.0 - v1.32.5
affected

v1.33.0 - v1.33.1
affected

Credits

amitschendel reporter

References

groups.google.com/...ernetes-security-announce/c/Zv84LMRuvMQ mailing-list

github.com/kubernetes/kubernetes/issues/132151 issue-tracking

cve.org (CVE-2025-4563)

nvd.nist.gov (CVE-2025-4563)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4563

Support options

Helpdesk Chat, Email, Knowledgebase