CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
34.8%
Medium
Cloud Foundry Foundation
Cloud foundry team found that the kernel audit logging is enabled on some components due to which various lifecycle workflows in the platform that use admin or service credentials in invocations of binaries are picked up by the audit logging, which record arguments passed to binary invocations that access the filesystem. A malicious user may use these credentials to deploy apps on CF instance.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2023-06-15: Initial vulnerability report published.
Vendor | Product | Version | CPE |
---|---|---|---|
cloudfoundry | nfs_volume_release | * | cpe:2.3:a:cloudfoundry:nfs_volume_release:*:*:*:*:*:*:*:* |
cloudfoundry | notifications | * | cpe:2.3:a:cloudfoundry:notifications:*:*:*:*:*:*:*:* |