Lucene search

K
cve[email protected]CVE-2022-36103
HistorySep 13, 2022 - 5:15 p.m.

CVE-2022-36103

2022-09-1317:15:08
CWE-732
CWE-863
web.nvd.nist.gov
366
6
cve-2022-36103
talos linux
kubernetes
validation
security
vulnerability
access control

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.8%

Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don’t have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don’t run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don’t allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.

Affected configurations

Vulners
NVD
Node
siderolabstalos_linuxRange<1.2.2
VendorProductVersionCPE
siderolabstalos_linux*cpe:2.3:o:siderolabs:talos_linux:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "talos",
    "vendor": "siderolabs",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.2.2"
      }
    ]
  }
]

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.8%

Related for CVE-2022-36103