#VU77526 Permissions, Privileges, and Access Controls in apiserver


Published: 2023-06-19

Vulnerability identifier: #VU77526

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-2728

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
apiserver
Web applications / Other software

Vendor: Kubernetes

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions. A remote user can launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers.

Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with ephemeral containers.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

apiserver: 1.18.0 - 1.27.2


External links
http://groups.google.com/a/kubernetes.io/g/dev/c/_Xx3ZrNeZYg/m/cjBUC0IxAAAJ


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability