CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-5651: Fence-agents-remediation: fence agent command line options leads to remote code execution

Description

A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

Classification

CVE ID: CVE-2024-5651

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 17.83% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://access.redhat.com/errata/RHSA-2024:5453
https://access.redhat.com/security/cve/CVE-2024-5651
https://bugzilla.redhat.com/show_bug.cgi?id=2290540

Timeline