CVE-2024-12698

6.5 MEDIUM

📋 TL;DR

This vulnerability is an incomplete fix for the Rapid Reset attack (CVE-2023-39325/CVE-2023-44487) in the ose-olm-catalogd-container component. It allows authenticated attackers to exploit HTTP/2 stream cancellation to cause denial of service. Affects Red Hat OpenShift environments using the affected container.

💻 Affected Systems

Products:
  • Red Hat OpenShift Container Platform
Versions: OpenShift Container Platform 4.15
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ose-olm-catalogd-container component in OpenShift 4.15 where the previous Rapid Reset fix was incomplete.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the ose-olm-catalogd-container service, potentially disrupting OpenShift cluster operations and application deployments.

🟠

Likely Case

Degraded performance or intermittent service disruption for the affected container component.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but could affect externally accessible OpenShift clusters.
🏢 Internal Only: MEDIUM - Internal attackers with authentication could disrupt cluster operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the affected container. Based on known HTTP/2 Rapid Reset attack patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenShift Container Platform 4.15.0-202403251547.p0.gb4e1e8e.assembly.stream

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:6122

Restart Required: Yes

Instructions:

1. Update OpenShift Container Platform to version 4.15.0-202403251547.p0.gb4e1e8e.assembly.stream or later. 2. Apply the update through the OpenShift web console or CLI. 3. Restart affected pods/containers.

🔧 Temporary Workarounds

Network segmentation and access control

linux

Restrict network access to the ose-olm-catalogd-container to only trusted sources.

Rate limiting

linux

Implement rate limiting for HTTP/2 connections to the affected service.

🧯 If You Can't Patch

  • Implement strict authentication and authorization controls to limit who can access the affected container.
  • Monitor for unusual HTTP/2 connection patterns and implement alerting for potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if running OpenShift Container Platform 4.15 with ose-olm-catalogd-container version before the fix. Use: oc get pods -n openshift-operator-lifecycle-manager | grep catalogd

Check Version:

oc version

Verify Fix Applied:

Verify the container image version matches or exceeds the patched version. Use: oc describe pod <catalogd-pod> -n openshift-operator-lifecycle-manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP/2 stream cancellation patterns
  • High rate of HTTP/2 RST_STREAM frames
  • Catalogd container restarting frequently

Network Indicators:

  • Excessive HTTP/2 RST_STREAM packets to port 8443
  • Unusual traffic patterns to the catalogd service

SIEM Query:

source="openshift-audit.log" AND "catalogd" AND ("error" OR "restart" OR "crash")

🔗 References

📤 Share & Export