{"id":"CVE-2020-14306","details":"An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","modified":"2026-03-14T10:11:52.403764Z","published":"2020-09-16T18:15:13.017Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850380"},{"type":"FIX","url":"https://github.com/maistra/istio-operator/pull/462"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/maistra/istio-operator","events":[{"introduced":"0"},{"last_affected":"bf27bd25783eba2aa64593ff63e1031d4e179a4c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.1.3"}]}}],"versions":["maistra-0.1.0","maistra-0.10.0","maistra-0.11.0","maistra-0.12.0","maistra-0.2.0","maistra-0.3.0","maistra-0.4.0","maistra-0.5.0","maistra-0.6.0","maistra-0.7.0","maistra-0.8.0","maistra-0.9.0","maistra-1.0.0","maistra-1.1.0","maistra-1.1.1","maistra-1.1.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14306.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}