A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.
History

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Title observability-operator: Observability Operator privilege escalation Observability-operator: observability operator privilege escalation
First Time appeared Redhat
Redhat cluster Observability Operator
CPEs cpe:/a:redhat:cluster_observability_operator:1.3::el9
Vendors & Products Redhat
Redhat cluster Observability Operator
References

Fri, 13 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.
Title observability-operator: Observability Operator privilege escalation
Weaknesses CWE-266
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-12T21:05:01.616Z

Reserved: 2025-03-27T03:15:47.915Z

Link: CVE-2025-2843

cve-icon Vulnrichment

Updated: 2025-11-12T20:47:56.688Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-12T17:15:37.550

Modified: 2025-11-14T16:42:30.503

Link: CVE-2025-2843

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-12T20:04:24Z

Links: CVE-2025-2843 - Bugzilla