Lucene search

K
cvelistKubernetesCVELIST:CVE-2023-2431
HistoryJun 16, 2023 - 7:08 a.m.

CVE-2023-2431 Bypass of seccomp profile enforcement

2023-06-1607:08:33
CWE-1287
kubernetes
www.cve.org
kubelet
seccomp
bypass
cve-2023-2431
enforcement

3.4 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CNA Affected

[
  {
    "vendor": "Kubernetes",
    "product": "Kubernetes",
    "repo": "https://github.com/kubernetes/kubernetes/",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "v1.24.14",
        "versionType": "kubelet v1.24"
      },
      {
        "status": "affected",
        "version": "v1.25.0",
        "lessThan": "v1.25.9",
        "versionType": "kubelet v1.25"
      },
      {
        "status": "affected",
        "version": "v1.26.0",
        "lessThan": "v1.26.4",
        "versionType": "kubelet v1.26"
      },
      {
        "status": "affected",
        "version": "v1.27.0",
        "lessThan": "v1.27.1",
        "versionType": "kubelet v1.27"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

3.4 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%