Lucene search

K
ibmIBM3A33CCD37E2DF7AF8B1E779E1063AD836CF34767294A40ED8497CBF108D2F679
HistoryAug 19, 2019 - 3:17 p.m.

Security Bulletin: IBM Cloud Kubernetes Service is affected by Kubernetes security vulnerability (CVE-2019-11247)

2019-08-1915:17:27
www.ibm.com
9

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

Summary

IBM Cloud Kubernetes Service is affected by a security vulnerability in Kubernetes API server that allows access to custom resources via wrong scope (CVE-2019-11247)

Vulnerability Details

CVE-ID: CVE-2019-11247
Description: Kubernetes could allow a remote authenticated attacker to gain unauthorized access to the system, caused by an error in the API server. By sending a specially crafted request using the wrong scope, an attacker could exploit this vulnerability to create, view, update or delete the cluster-scoped resource.
CVSS Base Score: 8.1
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/164767&gt; for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

IBM Cloud Kubernetes Service 1.15.0-1.15.1
IBM Cloud Kubernetes Service 1.14.0-1.14.4
IBM Cloud Kubernetes Service 1.13.0-1.13.8
IBM Cloud Kubernetes Service 1.5-1.12

Remediation/Fixes

IBM Cloud Kubernetes Service clusters at versions 1.13 and later have been updated to address this vulnerability. If your clusters are at versions 1.13, 1.14 or 1.15, there is no need to update worker nodes to address this vulnerability.

In some situations IBM Cloud Kubernetes Service might not have been able to update a cluster. To verify your clusters are no longer exposed use the following IBM Cloud CLI command to confirm the currently running versions:

ibmcloud ks clusters

If your cluster versions are at one of the following levels or later, you are no longer exposed to this vulnerability:

1.13.9
1.14.5
1.15.2

If one or more of your clusters is at version 1.13, 1.14 or 1.15 and has not been automatically updated then use the following IBM Cloud CLI command to complete the update, replacing โ€œ1.##โ€ with the target version.

ibmcloud ks cluster-update --cluster &lt;cluster name or ID&gt; --kube-version 1.##

Customers running IBM Cloud Kubernetes Service clusters at versions 1.11 or 1.12 must upgrade their affected clusters to version 1.13. Customers running IBM Cloud Kubernetes Service clusters at version 1.10 must upgrade first to version 1.12 and then to version 1.13. Please review the documentation before starting the upgrade since additional actions may be required.

If you are running IBM Cloud Kubernetes Service clusters at version 1.5, 1.7, 1.8 or 1.9, there is no migration path.

Note: IBM Cloud Kubernetes Service versions 1.5, 1.7, 1.8, 1.9, 1.10 and 1.11 are no longer supported, and version 1.12 is deprecated. See the IBM Cloud Kubernetes Service Version information and update actions documentation for more information about Kubernetes versions and version support policies.

Monitor IBM Cloud Status for Future Security Bulletins

Monitor the security notifications on the IBM Cloud Status page to be advised of future security bulletins.

References

Complete CVSS v3 Guide
On-line Calculator v3

Off

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œProductโ€:{โ€œcodeโ€:โ€œSSJTBPโ€,โ€œlabelโ€:โ€œIBM Cloud Kubernetes Serviceโ€},โ€œComponentโ€:โ€œโ€“โ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œAll Versionsโ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB21โ€,โ€œlabelโ€:โ€œPublic Cloud Platformโ€}}]

CPENameOperatorVersion
ibm cloud kubernetes serviceeqany

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P