#VU77775 Permissions, Privileges, and Access Controls in Kubelet


Published: 2023-06-28

Vulnerability identifier: #VU77775

Vulnerability risk: Low

CVSSv3.1: 3 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-2431

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Kubelet
Web applications / Modules and components for CMS

Vendor: Kubernetes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Kubelet: 1.27.0 - 1.27.1, 1.26.0 - 1.26.4, 1.25.0 - 1.25.9, 1.24.0 - 1.24.13


External links
http://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10
http://github.com/kubernetes/kubernetes/issues/118690
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability