CVE-2025-4563
Description
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The NodeRestriction admission controller in Kubernetes fails to validate dynamic resource allocation authorization during pod creation, allowing compromised nodes to create mirror pods that access unauthorized dynamic resources.
Vulnerability
Overview
A vulnerability exists in the Kubernetes NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks [1][2]. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation [1]. This oversight allows a compromised node to create mirror pods that reference ResourceClaims or ResourceClaimTemplates without proper authorization [2][3].
Attack
Vector and Prerequisites
The vulnerability is exploitable only when the DynamicResourceAllocation feature gate is enabled (disabled by default) and the cluster uses static pods [2]. A node must already be compromised to create mirror pods, meaning the attacker requires high privileges (PR:H) [1][2]. The attack is network-based with low complexity, but no user interaction is needed [1][2]. The kubelet does check the claim's allowed pod list before starting a pod, providing a second layer of defense; however, a static pod could still be created and potentially access the claim before the kubelet's runtime check [3][4].
Impact
A successful exploit could allow a compromised node to create mirror pods that access dynamic resources allocated to other pods, potentially leading to privilege escalation within the cluster [1][2]. The CVSS v3.1 score is 2.7 (Low) with a vector of AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L, indicating limited impact primarily to availability [1][2]. In practice, DRA drivers typically manage node-local resources that can already be accessed without involving DRA, so the real-world impact may be limited [3][4].
Mitigation and
Remediation
The vulnerability is fixed in kube-apiserver versions >= v1.32.6 and >= v1.33.2 [2]. The patch, merged via pull requests #131844 and #131876, rejects static pods that reference ResourceClaims or ResourceClaimTemplates at multiple levels: configuration validation in the kubelet, admission checking of node restrictions, and API validation [3][4]. As a workaround, if not actively using DynamicResourceAllocation features, administrators should disable the feature gate on the API server [2]. Detection involves checking for ResourceClaims and static pods in the cluster using kubectl commands [2].
- NVD - CVE-2025-4563
- [Security Advisory] CVE-2025-4563: Nodes can bypass dynamic resource allocation authorization checks
- DRA node: reject static pods which reference ResourceClaims by pohly · Pull Request #131844 · kubernetes/kubernetes
- Automated cherry pick of #131844: DRA node: reject static pods which reference ResourceClaims by pohly · Pull Request #131876 · kubernetes/kubernetes
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
k8s.io/kubernetesGo | >= 1.32.0, < 1.32.6 | 1.32.6 |
k8s.io/kubernetesGo | >= 1.33.0, < 1.33.2 | 1.33.2 |
Affected products
1- Range: >= 1.33.0, <= 1.33.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-hj2p-8wj8-pfq4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-4563ghsaADVISORY
- github.com/kubernetes/kubernetes/issues/132151nvdWEB
- github.com/kubernetes/kubernetes/pull/131844ghsaWEB
- github.com/kubernetes/kubernetes/pull/131875ghsaWEB
- github.com/kubernetes/kubernetes/pull/131876ghsaWEB
- groups.google.com/g/kubernetes-security-announce/c/Zv84LMRuvMQnvdWEB
- pkg.go.dev/vuln/GO-2025-3774ghsaWEB
News mentions
0No linked articles in our index yet.