Vulnerabilities > Redhat > Advanced Cluster Security

DATE CVE VULNERABILITY TITLE RISK
2023-12-18 CVE-2023-48795 Improper Validation of Integrity Check Value vulnerability in multiple products
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
5.9
2023-12-12 CVE-2023-4958 Improper Restriction of Rendered UI Layers or Frames vulnerability in Redhat Advanced Cluster Security 3.0/4.0
In Red Hat Advanced Cluster Security (RHACS), it was found that some security related HTTP headers were missing, allowing an attacker to exploit this with a clickjacking attack.
network
low complexity
redhat CWE-1021
6.1
2023-10-10 CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 7.5
2022-09-01 CVE-2022-1902 Exposure of System Data to an Unauthorized Control Sphere vulnerability in Redhat Advanced Cluster Security 3.68/3.69/3.70
A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes.
network
low complexity
redhat CWE-497
8.8