PT-2025-40011 · Red Hat · Red Hat Openshift Ai Service
Jon Weiser
·
Published
2025-09-29
·
Updated
2025-10-25
·
CVE-2025-10725
CVSS v3.1
9.9
Critical
| AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Red Hat OpenShift AI versions 2.19 through 2.21
Description
A critical flaw exists in Red Hat OpenShift AI Service that allows a low-privileged authenticated user, such as a data scientist using a Jupyter notebook, to escalate their privileges to a full cluster administrator. Successful exploitation grants the attacker complete control over the cluster, including the ability to steal sensitive data, disrupt services, and compromise the underlying infrastructure. The vulnerability is due to an overly permissive ClusterRoleBinding associating the
kueue-batch-user-role with the system:authenticated group. The vulnerability has a CVSS score of 9.9, indicating a critical risk. Reports suggest that Crimson Collective, a recently formed ransomware group, may have exploited undisclosed vulnerabilities in Red Hat products, though it is not confirmed if this is related to CVE-2025-10725.Recommendations
For OpenShift AI versions 2.19 through 2.21, enforce the principle of least privilege.
Restrict broad permissions granted to system-level groups.
Audit and review ClusterRoleBindings to ensure appropriate access control.
Monitor for suspicious job-creation activity.
Fix
LPE
Incorrect Privilege Assignment
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Red Hat Openshift Ai Service