Vulnerability identifier: #VU77775
Vulnerability risk: Low
CVSSv3.1: 3 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Kubelet
Web applications /
Modules and components for CMS
Vendor: Kubernetes
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Kubelet: 1.27.0 - 1.27.1, 1.26.0 - 1.26.4, 1.25.0 - 1.25.9, 1.24.0 - 1.24.13
External links
http://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10
http://github.com/kubernetes/kubernetes/issues/118690
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.