vulnerability

Red Hat OpenShift: CVE-2019-19335: openshift/installer: kubeconfig and kubeadmin-password are created with word-readable permissions

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Feb 13, 2020
Added
Feb 13, 2020
Modified
Aug 11, 2025

Description

During installation of an OpenShift 4 cluster, the `openshift-install` command line tool creates an `auth` directory, with `kubeconfig` and `kubeadmin-password` files. Both files contain credentials used to authenticate to the OpenShift API server, and are incorrectly assigned word-readable permissions. ose-installer as shipped in Openshift 4.2 is vulnerable.

Solutions

linuxrpm-upgrade-oselinuxrpm-upgrade-ose-baremetal
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.