CVE Vulnerabilities

CVE-2018-1000400

Improper Privilege Management

Published: May 18, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM

Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Cri-o Kubernetes * 1.9.0 (excluding)
Red Hat OpenShift Container Platform 3.9 RedHat atomic-openshift-0:3.9.30-1.git.0.dec1ba7.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat atomic-openshift-dockerregistry-0:3.9.30-1.git.349.8b7912c.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat atomic-openshift-web-console-0:3.9.30-1.git.245.4a3aade.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat cri-o-0:1.9.12-1.gitfa11beb.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat cri-tools-0:1.0.0-5.rhaos3.9.git8e6013a.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat golang-github-prometheus-node_exporter-0:3.9.30-1.git.890.7ea5173.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat openshift-ansible-0:3.9.30-1.git.7.46f8678.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat rubygem-fluent-plugin-elasticsearch-0:1.16.1-1.el7 *
Red Hat OpenShift Container Platform 3.9 RedHat rubygem-fluent-plugin-kubernetes_metadata_filter-0:1.0.3-1.el7 *

Potential Mitigations

References