Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

Posted on October 1, 2025October 1, 2025 By CWS

Oct 01, 2025Ravie LakshmananAI Safety / Cloud Safety
A extreme safety flaw has been disclosed within the Purple Hat OpenShift AI service that would permit attackers to escalate privileges and take management of the whole infrastructure underneath sure circumstances.
OpenShift AI is a platform for managing the lifecycle of predictive and generative synthetic intelligence (GenAI) fashions at scale and throughout hybrid cloud environments. It additionally facilitates information acquisition and preparation, mannequin coaching and fine-tuning, mannequin serving and mannequin monitoring, and {hardware} acceleration.
The vulnerability, tracked as CVE-2025-10725, carries a CVSS rating of 9.9 out of a most of 10.0. It has been categorized by Purple Hat as “Essential” and never “Vital” in severity owing to the necessity for a distant attacker to be authenticated to be able to compromise the atmosphere.
“A low-privileged attacker with entry to an authenticated account, for instance, as a knowledge scientist utilizing an ordinary Jupyter pocket book, can escalate their privileges to a full cluster administrator,” Purple Hat mentioned in an advisory earlier this week.

“This permits for the whole compromise of the cluster’s confidentiality, integrity, and availability. The attacker can steal delicate information, disrupt all companies, and take management of the underlying infrastructure, resulting in a complete breach of the platform and all purposes hosted on it.”
The next variations are affected by the flaw –

Purple Hat OpenShift AI 2.19
Purple Hat OpenShift AI 2.21
Purple Hat OpenShift AI (RHOAI)

As mitigations, Purple Hat is recommending that customers keep away from granting broad permissions to system-level teams, and “the ClusterRoleBinding that associates the kueue-batch-user-role with the system:authenticated group.”
“The permission to create jobs must be granted on a extra granular, as-needed foundation to particular customers or teams, adhering to the precept of least privilege,” it added.

The Hacker News Tags:Cloud, Exposes, Flaw, Full, Hat, Hybrid, Infrastructure, Openshift, Red, Takeover

Post navigation

Previous Post: Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware
Next Post: Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

Related Posts

Meta Shuts Down 150K Accounts in Global Anti-Scam Effort Meta Shuts Down 150K Accounts in Global Anti-Scam Effort The Hacker News
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
Meta Takes Legal Action Against Global Ad Scams Meta Takes Legal Action Against Global Ad Scams The Hacker News
CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
Veeam Fixes Critical Flaws in Backup Software Veeam Fixes Critical Flaws in Backup Software The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark