'Delightful' Red Hat OpenShift AI bug allows full takeoverwww.theregister.com: Who wouldn't want root access on cluster master nodes?
A 9.9 out of 10 severity bug in Red Hat's OpenShift AI service could allow a remote attacker with minimal authentication to steal data, disrupt services, and fully hijack the platform.
"A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator," the IBM subsidiary warned in a security alert published earlier this week.
"This allows for the complete compromise of the cluster's confidentiality, integrity, and availability," the alert continues. "The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it."

Red Hat fesses up to GitLab breach after attackers bragwww.theregister.com: Open source giant admits intruders broke into dedicated consulting instance, but insists core products untouched
The group also claims to have hit downstream Red Hat customers – claims that have prompted Belgium's national cybersecurity authority to sound the alarm. In an advisory on Friday, it warned of a "high risk... potential supply chain impact" and urged Belgian organizations to revoke and rotate all tokens, keys, and credentials shared with Red Hat or used in integrations.
"At this time, we have no reason to believe the security issue impacts any of our other Red Hat services or products and are highly confident in the integrity of our software supply chain," Red Hat spokesperson Stephanie Wonderlick told The Register.
Red Hat is equally silent on whether the intrusion involved ransomware or extortion. Unlike groups such as Clop, which specialize in double-extortion leaks, Crimson Collective has yet to establish much of a track record beyond bluster. For now, Red Hat has carefully avoided mentioning demands, negotiations, or the e-word.
