Kubernetes Security Flaw Let Attackers Escalate to Admin Privileges
A brand new privilege escalation vulnerability has been realized in Kubernetes, which enables risk actors to develop administrative privileges on affected pods. The CVE for this vulnerability has been assigned as CVE-2023-3676, and the severity has been given as 8.8 (Excessive).
Alternatively, Kubernetes has addressed this vulnerability and fastened this downside on their most standard version of Kubelet. Moreover, affected merchandise like additionally been published.
CVE-2023-3676: Privilege Escalation
This downside exists in Kubernetes in which a user who can to find pods on Windows nodes will doubtless be ready to escalate to admin privileges on those nodes. It was as soon as confirmed that this downside affects entirely if the Kubernetes cluster includes Windows nodes.
Additionally, the snarl kubectl fetch nodes -l kubernetes.io/os=windows can even be musty to envision if there are any Windows nodes in employ.
Affected Merchandise and Fixed variations
Product | Affected Merchandise | Fixed in Model |
kubelet | affected at v1.28.0affected from v1.27.0 thru v1.27.4affected from v1.26.0 thru v1.26.7affected from v1.25.0 thru v1.25.12affected from 0 thru v1.24.16 | unaffected at v1.28.1unaffected at v1.27.5unaffected at v1.26.8unaffected at v1.25.13unaffected at v1.24.17 |
Mitigation & Detection
To mitigate this downside, Kubernetes patches must be applied for CVE-2023-3676 on affected merchandise. Alternatively, for detecting this downside, Kubernetes audit logs can even be musty.
Pod-to find events and embedded PowerShell commands are any other staunch indication of exploitation. Config maps and secrets and tactics that like embedded PowerShell commands and are mounted into pods are additionally a staunch indication of exploitation.
Users of the affected variations of Kubernetes are prompt to pork up to basically the most standard version of these merchandise to prevent this vulnerability from getting exploited.
Source credit : cybersecuritynews.com