Description

A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.

INFO

Published Date :

2025-12-15T17:03:44.936Z

Last Modified :

2025-12-16T09:25:48.790Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-11393 vulnerability.

Vendors Products
Redhat
  • Insights-runtimes
  • Lightspeed For Runtimes

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact