Логотип exploitDog
bind:CVE-2022-36103
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-36103

Количество 3

Количество 3

nvd логотип

CVE-2022-36103

больше 3 лет назад

Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-7hgc-php5-77qq

больше 3 лет назад

Talos worker join token can be used to get elevated access level to the Talos API

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2022-06078

больше 3 лет назад

Уязвимость интерфейса операционных систем Talos Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-36103

Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default

CVSS3: 7.2
0%
Низкий
больше 3 лет назад
github логотип
GHSA-7hgc-php5-77qq

Talos worker join token can be used to get elevated access level to the Talos API

CVSS3: 7.2
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06078

Уязвимость интерфейса операционных систем Talos Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу