Lucene search

K
nvd[email protected]NVD:CVE-2023-2431
HistoryJun 16, 2023 - 8:15 a.m.

CVE-2023-2431

2023-06-1608:15:08
CWE-1287
web.nvd.nist.gov
cve-2023-2431
kubelet
seccomp
pod vulnerability
security bypass

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

Affected configurations

NVD
Node
kuberneteskubernetesRange<1.24.14
OR
kuberneteskubernetesRange1.25.01.25.10
OR
kuberneteskubernetesRange1.26.01.26.5
OR
kuberneteskubernetesRange1.27.01.27.2
Node
fedoraprojectfedoraMatch38

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%