QID 377856

Date Published: 2023-01-05

QID 377856: Kubernetes kubelet Neighboring Hosts Bypass Vulnerability

Kubernetes is an open-source container-orchestration system for automating deployment, scaling, and management of containerized applications.

Affected version:
kubelet/kube-proxy v1.18.0-1.18.3
kubelet/kube-proxy v1.17.0-1.17.6
kubelet/kube-proxy v1.1.0 -1.16.10
QID Detection Logic:(Authenticated)
The QID uses 'kubelet --version' command to check for vulnerable versions of Kubernetes kubelet

Successful exploitation of the vulnerability may allow an attacker kubernetes cluster network

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    For more information please visit 92315

    Workaround:
    You may be vulnerable if: You are running a vulnerable version (see below) Your cluster nodes run in an environment where untrusted hosts share the same layer 2 domain (i.e. same LAN) as nodes Your cluster allows untrusted pods to run containers with CAP_NET_RAW (the Kubernetes default is to allow this capability). Your nodes (or hostnetwork pods) run any localhost-only services which do not require any further authentication. To list services that are potentially affected, run the following commands on nodes: - lsof +c 15 -P -n [email protected] -sTCP:LISTEN - lsof +c 15 -P -n [email protected] On a master node, an lsof entry like this indicates that the API server may be listening with an insecure port: COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME kube-apiserver 123 root 7u IPv4 26799 0t0 TCP 127.0.0.1:8080 (LISTEN)

    CVEs related to QID 377856

    Software Advisories
    Advisory ID Software Component Link
    92315 URL Logo github.com/kubernetes/kubernetes/issues/92315