#VU77525 Permissions, Privileges, and Access Controls in apiserver - CVE-2023-2727


Vulnerability identifier: #VU77525

Vulnerability risk: Medium

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2727

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
apiserver
Web applications / Other software

Vendor: Kubernetes

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions. A remote user can launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers.

Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

apiserver: 1.18.0 - 1.27.2


External links
https://groups.google.com/a/kubernetes.io/g/dev/c/sBNyUMzDXSk/m/D6wP8ZowAAAJ?pli=1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability