CVE-2024-43803
Red Hat Enterprise Linux CoreOS (RHCOS) vulnerability analysis and mitigation

Overview

The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. A vulnerability was discovered in versions prior to 0.8.0, 0.6.2, and 0.5.2 where the BareMetalHost (BMH) CRD allows userData, metaData, and networkData to be specified as links to Kubernetes Secrets from any namespace. This vulnerability enables users with access to create or edit a BareMetalHost to potentially exfiltrate secrets from other namespaces (GitHub Advisory).

Technical details

The vulnerability stems from the BMO's ability to read Secrets from any namespace when specified in the BareMetalHost CRD's Name and Namespace fields. BMO will only read keys named 'value', 'userData', 'metaData', or 'networkData' from the secrets, which somewhat limits the exposure. The vulnerability has been assigned a CVSS v3.1 base score of 4.9 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N (GitHub Advisory).

Impact

An attacker with permissions to create or edit a BareMetalHost can exfiltrate secrets from other namespaces by using them as configuration data for provisioning hosts. This is particularly concerning for secrets used by other BareMetalHosts in different namespaces. The impact is limited to environments where cluster users have restricted privileges and are not administrators (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in BMO releases v0.8.0, v0.6.2, and v0.5.2. Users should upgrade to these versions. Before upgrading, any required BMC Secrets should be duplicated to the namespace where the corresponding BMH is located. After upgrading, the old secrets can be removed. As a workaround, operators can configure BMO RBAC to be namespace-scoped for Secrets instead of cluster-scoped, preventing BMO from accessing secrets from other namespaces (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Red Hat Enterprise Linux CoreOS (RHCOS) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40780HIGH8.6
  • Rocky LinuxRocky Linux
  • bind9-next-utils
NoYesOct 22, 2025
CVE-2025-52565HIGH8.4
  • cAdvisorcAdvisor
  • kernel-debug
NoYesNov 06, 2025
CVE-2025-8677HIGH7.5
  • Rocky LinuxRocky Linux
  • bindutils
NoYesOct 22, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • kernel-abi-stablelists
NoYesNov 06, 2025
CVE-2025-31133HIGH7.3
  • cAdvisorcAdvisor
  • kernel-abi-stablelists
NoYesNov 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management