Vulnerability identifier: #VU77525
Vulnerability risk: Medium
CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
apiserver
Web applications /
Other software
Vendor: Kubernetes
Description
The vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions. A remote user can launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers.
Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
apiserver: 1.18.0 - 1.27.2
External links
https://groups.google.com/a/kubernetes.io/g/dev/c/sBNyUMzDXSk/m/D6wP8ZowAAAJ?pli=1
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.