CVE-2024-53350
Published: 21 March 2025
Summary
CVE-2024-53350 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Kubeslice Kubeslice. Its CVSS base score is 7.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper privilege management by ensuring service accounts operate with least privilege, preventing escalation from token access.
Enforces approved access control policies to block unauthorized access to service account tokens due to insecure permissions.
Mandates secure configuration settings for permissions on service account tokens to mitigate exposure vulnerabilities.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in network-accessible Kubeslice service allows remote unauthenticated access to service account token due to insecure permissions, directly enabling exploitation of public-facing app for credential access and privilege escalation.
NVD Description
Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.
Deeper analysisAI
CVE-2024-53350 is a vulnerability in Kubeslice version 1.3.1 stemming from insecure permissions that enable attackers to access the service account's token, facilitating privilege escalation. Assigned CWE-269 (Improper Privilege Management), it carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high confidentiality and integrity impacts with no availability disruption.
The vulnerability can be exploited by unauthenticated attackers over the network, though it requires high attack complexity. Successful exploitation grants access to the service account token, allowing privilege escalation within the affected Kubeslice environment.
Mitigation guidance and further details are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03, the Kubeslice GitHub repository at https://github.com/kubeslice/kubeslice, and documentation at https://kubeslice.io/documentation/open-source/1.3.0. Security practitioners should review these sources for patches or workarounds.
Details
- CWE(s)