Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-2431

Опубликовано: 16 июн. 2023
Источник: redhat
CVSS3: 3.4
EPSS Низкий

Описание

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

A flaw was found in Kubernetes. This issue occurs when Kubernetes allows a local authenticated attacker to bypass security restrictions, caused by a flaw when using the localhost type for a seccomp profile but specifying an empty profile field. An attacker can bypass the seccomp profile enforcement by sending a specially crafted request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5kubernetesNot affected
OpenShift API for Data Protectionoadp/oadp-velero-plugin-for-microsoft-azure-rhel8Fix deferred
OpenShift Serverlessio.fabric8:kubernetes-modelFix deferred
Red Hat Advanced Cluster Security 3advanced-cluster-security/rhacs-main-rhel8Fix deferred
Red Hat Advanced Cluster Security 3advanced-cluster-security/rhacs-scanner-rhel8Fix deferred
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-main-rhel8Fix deferred
Red Hat Enterprise Linux 7kubernetesOut of support scope
Red Hat OpenShift Container Platform 4csi-driver-nfs-containerNot affected
Red Hat OpenShift Container Platform 4openshift4/cnf-tests-rhel8Not affected
Red Hat OpenShift Container Platform 4openshift4/dpu-network-rhel8-operatorNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2215555kubernetes: Bypass of seccomp profile enforcement

EPSS

Процентиль: 0%
0.00007
Низкий

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 3.4
ubuntu
около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
nvd
около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
debian
около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass ...

suse-cvrf
почти 2 года назад

Security update for kubernetes1.23

CVSS3: 4.4
github
около 2 лет назад

Kubelet vulnerable to bypass of seccomp profile enforcement

EPSS

Процентиль: 0%
0.00007
Низкий

3.4 Low

CVSS3