Логотип exploitDog
bind:CVE-2024-9594
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-9594

Количество 6

Количество 6

ubuntu логотип

CVE-2024-9594

около 1 года назад

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2024-9594

около 1 года назад

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2024-9594

около 1 года назад

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-8jpg-62jc-hwhr

около 1 года назад

VM images built with Image Builder with some providers use default credentials during builds in github.com/kubernetes-sigs/image-builder

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-08157

около 1 года назад

Уязвимость программного средства для создания образов контейнеров Kubernetes Image Builder, связанная с использованием жестко закодированных учетных данных, позволяющая нарушителю получить доступ к виртуальной машине

CVSS3: 6.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3911-1

около 1 года назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-9594

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
1%
Низкий
около 1 года назад
redhat логотип
CVE-2024-9594

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-9594

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

CVSS3: 6.3
1%
Низкий
около 1 года назад
github логотип
GHSA-8jpg-62jc-hwhr

VM images built with Image Builder with some providers use default credentials during builds in github.com/kubernetes-sigs/image-builder

CVSS3: 6.3
1%
Низкий
около 1 года назад
fstec логотип
BDU:2024-08157

Уязвимость программного средства для создания образов контейнеров Kubernetes Image Builder, связанная с использованием жестко закодированных учетных данных, позволяющая нарушителю получить доступ к виртуальной машине

CVSS3: 6.3
1%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3911-1

Security update for govulncheck-vulndb

около 1 года назад

Уязвимостей на страницу