Lucene search

K
gentooGentoo FoundationGLSA-202405-31
HistoryMay 12, 2024 - 12:00 a.m.

Kubelet: Privilege Escalation

2024-05-1200:00:00
Gentoo Foundation
security.gentoo.org
10
kubelet
kubernetes
privilege escalation
cve
windows nodes
admin privilege

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

18.9%

Background

Kubelet is a Kubernetes Node Agent.

Description

A vulnerability has been discovered in Kubelet. Please review the CVE identifier referenced below for details.

Impact

A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

Workaround

There is no known workaround at this time.

Resolution

All Kubelet users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-cluster/kubelet-1.28.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-cluster/kubelet< 1.28.5UNKNOWN

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

18.9%