Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14336

Опубликовано: 13 июл. 2020
Источник: redhat
CVSS3: 3.1

Описание

A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.

Отчет

By default, the OpenShift Container Platform uses the OpenShift SDN network interface. This interface makes this attack impractical by implementing IPTable rules on the host side of the virtual network interface, isolating network traffic to within the pod. If the OpenShift Container Platform has the sriov-network-operator deployed, it is at a greater risk for exploitation. If installing a new OCP 4.6 cluster no changes are required. If upgrading a cluster from an earlier version to 4.5.16 be sure to delete 99-worker-generated-crio-capabilities and 99-master-generated-crio-capabilities machine controllers once you have tested that dropping NET_RAW does not break your cluster workload.

Меры по смягчению последствий

On OCP 3.11 create a custom SCC based on 'restricted' and also drop the NET_RAW capability[1]. Assign this custom SCC to any users, or groups which create pods you want to protect. See the documentation for more information [2]. [1] https://access.redhat.com/solutions/5611521 [2] https://docs.openshift.com/container-platform/3.11/admin_guide/manage_scc.html

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftFix deferred
Red Hat OpenShift Container Platform 4.5openshift4/ose-machine-config-operatorFixedRHSA-2020:432026.10.2020
Red Hat OpenShift Container Platform 4.6openshift4/ose-machine-config-operatorFixedRHSA-2020:429827.10.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1858981openshift: restricted SCC allows pods to craft custom network packets

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.

3.1 Low

CVSS3