Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2024-6840
HistorySep 12, 2024 - 4:35 p.m.

CVE-2024-6840 Automation-controller: gain access to the k8s api server via job execution with container group

2024-09-1216:35:08
CWE-285
redhat
github.com
2
security flaw
ansible automation controller
authorization
kubernetes api
privilege escalation
service account token

CVSS3

6.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

16.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An improper authorization flaw exists in the Ansible Automation Controller. This flaw allows an attacker using the k8S API server to send an HTTP request with a service account token mounted via automountServiceAccountToken: true, resulting in privilege escalation to a service account.

CVSS3

6.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

16.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6840