Cyber Posture

CVE-2024-53350

High

Published: 21 March 2025

Published
21 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0008 24.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53350 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Kubeslice Kubeslice. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses improper privilege management by ensuring service accounts operate with least privilege, preventing escalation from token access.

prevent

Enforces approved access control policies to block unauthorized access to service account tokens due to insecure permissions.

prevent

Mandates secure configuration settings for permissions on service account tokens to mitigate exposure vulnerabilities.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vulnerability in network-accessible Kubeslice service allows remote unauthenticated access to service account token due to insecure permissions, directly enabling exploitation of public-facing app for credential access and privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.

Deeper analysisAI

CVE-2024-53350 is a vulnerability in Kubeslice version 1.3.1 stemming from insecure permissions that enable attackers to access the service account's token, facilitating privilege escalation. Assigned CWE-269 (Improper Privilege Management), it carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high confidentiality and integrity impacts with no availability disruption.

The vulnerability can be exploited by unauthenticated attackers over the network, though it requires high attack complexity. Successful exploitation grants access to the service account token, allowing privilege escalation within the affected Kubeslice environment.

Mitigation guidance and further details are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03, the Kubeslice GitHub repository at https://github.com/kubeslice/kubeslice, and documentation at https://kubeslice.io/documentation/open-source/1.3.0. Security practitioners should review these sources for patches or workarounds.

Details

CWE(s)

Affected Products

kubeslice
kubeslice
≤ 1.3.1

CVEs Like This One

CVE-2025-15027Shared CWE-269
CVE-2025-0180Shared CWE-269
CVE-2026-5144Shared CWE-269
CVE-2025-29165Shared CWE-269
CVE-2025-13764Shared CWE-269
CVE-2025-6758Shared CWE-269
CVE-2025-8900Shared CWE-269
CVE-2025-8489Shared CWE-269
CVE-2024-9636Shared CWE-269
CVE-2025-11533Shared CWE-269

References