Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10749

Опубликовано: 01 июн. 2020
Источник: redhat
CVSS3: 6
EPSS Низкий

Описание

A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.

A vulnerability was found in affected container networking implementations that allow malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending “rogue” IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.

Отчет

In OpenShift Container Platform 4, the default network plugin, OpenShift SDN, and OVN Kubernetes, do not forward IPv6 traffic, making this vulnerability not exploitable. The affected code from containernetworking/plugins is however still included in these plugins, hence this vulnerability is rated Low for both OpenShift SDN and OVN-Kubernetes. IPv6 traffic is not forwarded by the OpenShift SDN in OpenShift Container Platform 3.11, making this vulnerability not exploitable. However, the affected code from containernetworking/plugins is still included in the atomic-openshift package, hence this vulnerability is rated Low for OpenShift Container Platform 3.11.

Меры по смягчению последствий

Prevent untrusted, non-privileged containers from running with CAP_NET_RAW.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8container-tools:1.0/containernetworking-pluginsOut of support scope
Red Hat Enterprise Linux 8container-tools:2.0/containernetworking-pluginsAffected
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-container-networking-plugins-rhel8Affected
Red Hat OpenShift Container Platform 4openshift4/ose-ovn-kubernetesAffected
Red Hat OpenShift Container Platform 4openshift4/sriov-cni-rhel9Will not fix
Red Hat OpenShift Virtualization 1multus-cniWill not fix
Red Hat OpenShift Virtualization 1ovs-cni-pluginWill not fix
Red Hat OpenShift Virtualization 2ovs-cni-pluginAffected
Red Hat Enterprise Linux 7 Extrascontainernetworking-pluginsFixedRHSA-2020:268423.06.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1833220containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters

EPSS

Процентиль: 87%
0.036
Низкий

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
ubuntu
около 5 лет назад

A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.

CVSS3: 6
nvd
около 5 лет назад

A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.

CVSS3: 6
debian
около 5 лет назад

A vulnerability was found in all versions of containernetworking/plugi ...

suse-cvrf
около 5 лет назад

Security update for cni-plugins

suse-cvrf
около 5 лет назад

Security update for cni-plugins

EPSS

Процентиль: 87%
0.036
Низкий

6 Medium

CVSS3