ghsa-7fxm-f474-hf8w
Vulnerability from github
Published
2023-10-31 21:32
Modified
2025-02-13 19:20
Severity ?
Summary
Kubernetes privilege escalation vulnerability
Details
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ affected: [ { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.28.0", }, { fixed: "1.28.1", }, ], type: "ECOSYSTEM", }, ], versions: [ "1.28.0", ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.27.0", }, { fixed: "1.27.5", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.26.0", }, { fixed: "1.26.8", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.25.0", }, { fixed: "1.25.13", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "1.24.17", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2023-3676", ], database_specific: { cwe_ids: [ "CWE-20", ], github_reviewed: true, github_reviewed_at: "2023-11-01T14:36:22Z", nvd_published_at: "2023-10-31T21:15:08Z", severity: "HIGH", }, details: "A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.", id: "GHSA-7fxm-f474-hf8w", modified: "2025-02-13T19:20:54Z", published: "2023-10-31T21:32:35Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/issues/119339", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120127", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120129", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120130", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120131", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120132", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120133", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/073f9ea33a93ddaecdc2e829150fb715f6387399", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/39cc101c7855341c651a943b9836b50fbace8a6b", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/74b617310c24ca84c2ec90c3858af745d65b5226", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/890483394221c8f22e88c48f86cd4eaf4de65fd6", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/a53faf5e17ed0b0771a605c6401ba4cbf297b59a", }, { type: "PACKAGE", url: "https://github.com/kubernetes/kubernetes", }, { type: "WEB", url: "https://groups.google.com/g/kubernetes-security-announce/c/d_fvHZ9a5zc", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20231130-0007", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], summary: "Kubernetes privilege escalation vulnerability", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.