Overview

FieldValue
ID1067
NameManage ServiceAccounts cluster-wide
Risk CategoryElevation of Privilege
Risk LevelHigh
Role TypeClusterRole
API Groupscore
Resourcesserviceaccounts
Verbscreate, update, patch, delete
TagsIdentityManagement PotentialPrivilegeEscalation Tampering

Description

Allows creating, updating, or deleting ServiceAccounts in any namespace. This can be used to create SAs, then bind them to privileged roles (if other RBAC permissions allow), or modify existing SAs, potentially interfering with workload identities.

Abuse Scenarios

  1. Create a new ServiceAccount in any namespace.
kubectl create serviceaccount <new-sa-name> -n <namespace>
# Example: kubectl create serviceaccount backdoor-sa -n kube-system
  1. Delete an existing ServiceAccount, potentially disrupting workloads.
kubectl delete serviceaccount <serviceaccount-name> -n <namespace>
# Example: kubectl delete serviceaccount default -n default