CVE-2021-20238
OpenShift Node vulnerability analysis and mitigation

It was found in OpenShift Container Platform 4 that ignition config, served by the Machine Config Server, can be accessed externally from clusters without authentication. The MCS endpoint (port 22623) provides ignition configuration used for bootstrapping Nodes and can include some sensitive data, e.g. registry pull secrets. There are two scenarios where this data can be accessed. The first is on Baremetal, OpenStack, Ovirt, Vsphere and KubeVirt deployments which do not have a separate internal API endpoint and allow access from outside the cluster to port 22623 from the standard OpenShift API Virtual IP address. The second is on cloud deployments when using unsupported network plugins, which do not create iptables rules that prevent to port 22623. In this scenario, the ignition config is exposed to all pods within the cluster and cannot be accessed externally.


SourceNVD

Related OpenShift Node vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-32990HIGH8.2
  • GnuTLSGnuTLS
  • mingw32-gnutls
NoYesJul 10, 2025
CVE-2025-7424HIGH7.5
  • Apple SafariApple Safari
  • cpe:2.3:a:redhat:openshift_container_platform
NoYesJul 10, 2025
CVE-2025-4953HIGH7.4
  • PodmanPodman
  • container-tools:rhel8::crun
NoYesSep 16, 2025
CVE-2025-7519MEDIUM6.7
  • CBL MarinerCBL Mariner
  • polkit-doc
NoYesJul 14, 2025
CVE-2025-8283LOW3.7
  • RustRust
  • aardvark-dns
NoYesJul 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management