CVE Vulnerabilities

CVE-2018-1000400

Improper Privilege Management

Published: May 18, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Cri-oKubernetes*1.9.0 (excluding)
Red Hat OpenShift Container Platform 3.9RedHatatomic-openshift-0:3.9.30-1.git.0.dec1ba7.el7*
Red Hat OpenShift Container Platform 3.9RedHatatomic-openshift-dockerregistry-0:3.9.30-1.git.349.8b7912c.el7*
Red Hat OpenShift Container Platform 3.9RedHatatomic-openshift-web-console-0:3.9.30-1.git.245.4a3aade.el7*
Red Hat OpenShift Container Platform 3.9RedHatcri-o-0:1.9.12-1.gitfa11beb.el7*
Red Hat OpenShift Container Platform 3.9RedHatcri-tools-0:1.0.0-5.rhaos3.9.git8e6013a.el7*
Red Hat OpenShift Container Platform 3.9RedHatgolang-github-prometheus-node_exporter-0:3.9.30-1.git.890.7ea5173.el7*
Red Hat OpenShift Container Platform 3.9RedHatopenshift-ansible-0:3.9.30-1.git.7.46f8678.el7*
Red Hat OpenShift Container Platform 3.9RedHatrubygem-fluent-plugin-elasticsearch-0:1.16.1-1.el7*
Red Hat OpenShift Container Platform 3.9RedHatrubygem-fluent-plugin-kubernetes_metadata_filter-0:1.0.3-1.el7*

Potential Mitigations

References