CVE-2025-47283

9.9 CRITICAL

📋 TL;DR

A privilege escalation vulnerability in Gardener allows project administrators to gain control over seed clusters managing their shoot clusters. This affects all Gardener installations regardless of cloud provider. The vulnerability is in the gardenlet component and enables administrative takeover of underlying infrastructure.

💻 Affected Systems

Products:
  • gardener/gardener (gardenlet)
Versions: All versions prior to 1.116.4, 1.117.5, 1.118.2, and 1.119.0
Operating Systems: Any OS running Gardener
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Gardener installations regardless of cloud provider. Requires administrative privileges at the project level.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of seed clusters leading to control over all managed Kubernetes clusters, data exfiltration, service disruption, and lateral movement to other projects.

🟠

Likely Case

Project administrators exploiting legitimate access to escalate privileges and gain unauthorized control over seed infrastructure, potentially affecting multiple shoot clusters.

🟢

If Mitigated

Limited to authorized project administrators who must actively exploit the vulnerability; proper access controls and monitoring could detect and contain the escalation.

🌐 Internet-Facing: MEDIUM - While Gardener management interfaces may be internet-accessible, exploitation requires administrative project credentials.
🏢 Internal Only: HIGH - Internal administrators with project-level access can exploit this to gain seed cluster control, affecting multiple downstream clusters.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires administrative project credentials but exploitation appears straightforward based on advisory.

Exploitation requires existing administrative access to a Gardener project. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.116.4, 1.117.5, 1.118.2, or 1.119.0

Vendor Advisory: https://github.com/gardener/gardener/security/advisories/GHSA-3hw7-qj9h-r835

Restart Required: Yes

Instructions:

1. Identify current Gardener version. 2. Upgrade to patched version (1.116.4, 1.117.5, 1.118.2, or 1.119.0). 3. Restart gardenlet components. 4. Verify upgrade completion and functionality.

🔧 Temporary Workarounds

Restrict Project Administrator Access

all

Temporarily reduce the number of users with project administrator privileges to minimize attack surface.

Enhanced Monitoring of Administrative Actions

all

Implement additional logging and alerting for administrative operations on seed clusters.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for project administrators
  • Deploy network segmentation between project and seed cluster management planes

🔍 How to Verify

Check if Vulnerable:

Check Gardener version: if running version older than 1.116.4, 1.117.5, 1.118.2, or 1.119.0, system is vulnerable.

Check Version:

kubectl get pods -n garden -l app=gardenlet -o jsonpath='{.items[*].spec.containers[*].image}' | grep -o 'gardener/gardener:[^ ]*'

Verify Fix Applied:

Confirm Gardener version is 1.116.4, 1.117.5, 1.118.2, or 1.119.0 and verify gardenlet component is running patched version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative operations on seed clusters from project administrators
  • Privilege escalation attempts in gardenlet logs
  • Unexpected configuration changes to seed cluster resources

Network Indicators:

  • Unusual API calls from project namespaces to seed cluster control plane
  • Anomalous traffic patterns between shoot and seed clusters

SIEM Query:

source="gardener-logs" AND ("privilege escalation" OR "unauthorized seed access" OR "project admin to seed cluster")

🔗 References

📤 Share & Export