CVE-2018-1000400Improper Privilege Management in Kubernetes Cri-o

Severity
8.8HIGHNVD
EPSS
0.9%
top 24.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 18
Latest updateMay 13

Description

Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

NVDkubernetes/cri-o< 1.9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-339v-9xv2-qg2w: Kubernetes CRI-O version prior to 12022-05-13
CVEList
CVE-2018-1000400: Kubernetes CRI-O version prior to 12018-05-18

📋Vendor Advisories

1
Red Hat
cri-o: capabilities are not dropped when switching to a non-root user2018-04-27

💬Community

2
Bugzilla
CVE-2018-1000400 cri-o: capabilities are not dropped when switching to a non-root user2018-05-14
Bugzilla
CVE-2018-1000400 cri-o: capabilities are not dropped when switching to a non-root user [fedora-all]2018-05-14
CVE-2018-1000400 — Improper Privilege Management | cvebase