CVE-2024-5651

Fence-agents-remediation: fence agent command line options leads to remote code execution

Description

A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

Remediation

Workaround:

  • Do not allow unprivileged users create FenceAgentsRemediation and FenceAgentsRemediationTemplate resources.

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
EPSS 3.38% Top 15%
Vendor Advisory redhat.com
Affected: Red Hat Fence Agents Remediation 0.4 for RHEL 8
Affected: Red Hat Fence Agents Remediation 0.4 for RHEL 8
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-5651?
CVE-2024-5651 has been scored as a high severity vulnerability.
How to fix CVE-2024-5651?
As a workaround for remediating CVE-2024-5651: Do not allow unprivileged users create FenceAgentsRemediation and FenceAgentsRemediationTemplate resources.
Is CVE-2024-5651 being actively exploited in the wild?
It is possible that CVE-2024-5651 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~3% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-5651?
CVE-2024-5651 affects Red Hat Fence Agents Remediation 0.4 for RHEL 8, Red Hat Fence Agents Remediation 0.4 for RHEL 8.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.