Overview

FieldValue
ID1061
NameWildcard permission on all resources in a namespace (Namespace Admin)
Risk CategoryElevation of Privilege
Risk LevelCritical
Role TypeRole
API Groups*
Resources*
Verbs*
TagsDenialOfService InformationDisclosure NamespaceAdmin PotentialPrivilegeEscalation Spoofing (+2 more)

Description

Grants unrestricted, wildcard (’*’) access to all API groups, resources, and verbs within a specific namespace. This provides full administrative control over that namespace and can often be leveraged to escalate privileges to cluster-wide admin depending on the cluster configuration and installed operators.

Abuse Scenarios

  1. List all resources within the specific namespace.
kubectl get all -n <namespace>
# Example: kubectl get all -n production
  1. Create a privileged pod within the namespace (if not blocked by PSP/PSA).
kubectl create -n <namespace> -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
  name: namespace-admin-pod
spec:
  containers:
  - name: attacker
    image: busybox
    command: ["/bin/sh", "-c", "sleep infinity"]
    securityContext:
      privileged: true
EOF
# Example: kubectl create -n default -f - <<EOF ... EOF