Learn about CVE-2019-10165 affecting OpenShift Container Platform versions before 4.1.3. Discover the impact, technical details, and mitigation steps for this vulnerability.
OpenShift Container Platform prior to version 4.1.3 had a vulnerability where OAuth tokens were stored in plaintext in audit logs, potentially allowing unauthorized access to resources.
Understanding CVE-2019-10165
This CVE involves a security issue in OpenShift Container Platform versions before 4.1.3, where sensitive OAuth tokens were stored in clear text within audit logs, posing a risk of unauthorized access.
What is CVE-2019-10165?
Prior to version 4.1.3, OpenShift Container Platform stored OAuth tokens in plaintext within audit logs of Kubernetes and OpenShift API servers, enabling individuals with sufficient privileges to exploit these tokens for unauthorized resource access.
The Impact of CVE-2019-10165
The vulnerability's CVSS score is 2.3 (Low severity) with a low confidentiality impact. However, it poses a risk of unauthorized access to resources if exploited by an attacker with high privileges.
Technical Details of CVE-2019-10165
This section provides detailed technical insights into the vulnerability.
Vulnerability Description
OpenShift Container Platform versions before 4.1.3 exposed OAuth tokens in plaintext within audit logs, potentially allowing attackers to gain unauthorized access to resources.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2019-10165 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates