Red Hat OpenShift on IBM Cloud is affected by an OpenShift security vulnerability that allows an attacker to masquerade as a trusted in-cluster service (CVE-2021-3636).
CVEID: CVE-2021-3636
Description: It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service.
CVSS Base Score: 4.6
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/206555> for more information
CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)
Red Hat OpenShift on IBM Cloud 4.3-4.7
Red Hat OpenShift on IBM Cloud 3.11
Red Hat OpenShift on IBM Cloud version 4.8 is available to fix this vulnerability. Customers must upgrade their clusters to version 4.8 to address the vulnerability. Once the cluster master and worker nodes are upgraded, all pods will use the secure service CA. No further action is required.
Customers running Red Hat OpenShift on IBM Cloud clusters at version 4.5, 4.6 or 4.7 must upgrade their clusters to version 4.8. Please review the documentation before starting an upgrade since additional actions may be required.
Customers running Red Hat OpenShift on IBM Cloud clusters at version 3.11, 4.3 or 4.4 must create a new cluster at version 4.8 and deploy their apps to the new cluster.
Red Hat OpenShift on IBM Cloud versions 4.3, 4.4 and 4.5 are no longer supported and version 3.11 is deprecated. See the Red Hat OpenShift on IBM Cloud version information and update actions documentation for more information about OpenShift versions and version support policies.
Monitor the security notifications on the IBM Cloud Status page to be advised of future security bulletins.
Complete CVSS v3 Guide
On-line Calculator v3
Off
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
[{“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Product”:{“code”:“SSJTBP”,“label”:“IBM Cloud Kubernetes Service and Red Hat OpenShift on IBM Cloud”},“Component”:“–”,“Platform”:[{“code”:“PF025”,“label”:“Platform Independent”}],“Version”:“All Versions”,“Edition”:“”,“Line of Business”:{“code”:“LOB21”,“label”:“Public Cloud Platform”}}]