Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-2025 CVE-2020-2024 |
CWE-ID | CWE-59 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
Kata Containers Server applications / Virtualization software |
Vendor | Kata Containers |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU33995
Risk: High
CVSSv3.1: 7.8 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-2025
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to take over all guest operating systems on the hypervisor.
Kata Containers before 1.11.0 on Cloud Hypervisor persists guest filesystem changes to the underlying image file on the host. A malicious guest can overwrite the image file to gain control of all subsequent guest VMs. Since Kata Containers uses the same VM image file with all VMMs, this issue may also affect QEMU and Firecracker based guests.
MitigationInstall updates from vendor's website.
Vulnerable software versionsKata Containers: 1.9.3 - 1.10.6
External linkshttp://github.com/kata-containers/runtime/pull/2487
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU33996
Risk: Medium
CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-2024
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS.
MitigationInstall updates from vendor's website.
Vulnerable software versionsKata Containers: 1.9.3 - 1.10.6
External linkshttp://github.com/kata-containers/runtime/issues/2474
http://github.com/kata-containers/runtime/pull/2475
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.