Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-29179
HistoryMay 20, 2022 - 6:30 p.m.

CVE-2022-29179 Improper Privilege Management in Cilium

2022-05-2018:30:12
CWE-269
GitHub_M
www.cve.org

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Prior to versions 1.9.16, 1.10.11, and 1.11.15, if an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed, the attacker can escalate privileges to cluster admin by using Cilium’s Kubernetes service account. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. There are no known workarounds available.

CNA Affected

[
  {
    "product": "cilium",
    "vendor": "cilium",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.9.16"
      },
      {
        "status": "affected",
        "version": ">= 1.10.0, < 1.10.11"
      },
      {
        "status": "affected",
        "version": ">= 1.11.0, < 1.11.5"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for CVELIST:CVE-2022-29179