Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-36103

Опубликовано: 13 сент. 2022
Источник: nvd
CVSS3: 7.2
CVSS3: 8.8
EPSS Низкий

Описание

Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:siderolabs:talos_linux:*:*:*:*:*:*:*:*
Версия до 1.2.2 (исключая)

EPSS

Процентиль: 49%
0.00259
Низкий

7.2 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-732
CWE-863

Связанные уязвимости

CVSS3: 7.2
github
больше 3 лет назад

Talos worker join token can be used to get elevated access level to the Talos API

CVSS3: 7.2
fstec
больше 3 лет назад

Уязвимость интерфейса операционных систем Talos Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 49%
0.00259
Низкий

7.2 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-732
CWE-863