QID 377856
Date Published: 2023-01-05
QID 377856: Kubernetes kubelet Neighboring Hosts Bypass Vulnerability
Kubernetes is an open-source container-orchestration system for automating deployment, scaling, and management of containerized applications.
Affected version:
kubelet/kube-proxy v1.18.0-1.18.3
kubelet/kube-proxy v1.17.0-1.17.6
kubelet/kube-proxy v1.1.0 -1.16.10
QID Detection Logic:(Authenticated)
The QID uses 'kubelet --version' command to check for vulnerable versions of Kubernetes kubelet
Successful exploitation of the vulnerability may allow an attacker kubernetes cluster network
Workaround:
You may be vulnerable if:
You are running a vulnerable version (see below)
Your cluster nodes run in an environment where untrusted hosts share the same layer 2 domain (i.e. same LAN) as nodes
Your cluster allows untrusted pods to run containers with CAP_NET_RAW (the Kubernetes default is to allow this capability).
Your nodes (or hostnetwork pods) run any localhost-only services which do not require any further authentication. To list services that are potentially affected, run the following commands on nodes:
- lsof +c 15 -P -n [email protected] -sTCP:LISTEN
- lsof +c 15 -P -n [email protected]
On a master node, an lsof entry like this indicates that the API server may be listening with an insecure port:
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
kube-apiserver 123 root 7u IPv4 26799 0t0 TCP 127.0.0.1:8080 (LISTEN)
CVEs related to QID 377856
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| 92315 |
|