CVE-2019-11245Improper Check or Handling of Exceptional Conditions in Kubernetes CMD Kubelet

Severity
7.8HIGHNVD
CNA4.9
EPSS
0.2%
top 63.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 29
Latest updateJun 10

Description

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Gok8s.io/kubernetes_cmd_kubelet1.14.01.14.3+1
Gok8s.io/kubernetes1.13.01.13.7+1
CVEListV5kubernetes/kubernetesv1.13.6, v1.14.2+1
NVDkubernetes/kubernetes1.13.6, 1.14.2+1

Patches

🔴Vulnerability Details

4
OSV
Kubelet Incorrect Privilege Assignment in k8s.io/kubernetes2024-06-10
OSV
Kubelet Incorrect Privilege Assignment2024-04-24
GHSA
Kubelet Incorrect Privilege Assignment2024-04-24
CVEList
kubelet-started container uid changes to root after first restart or if image is already pulled to the node2019-08-29

📋Vendor Advisories

2
Red Hat
kubernetes: container uid changes to root after first restart2019-05-24
Debian
CVE-2019-11245: kubernetes - In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an expli...2019

🕵️Threat Intelligence

2
Unit42
Non-Root Containers, Kubernetes CVE-2019-11245 and Why You Should Care2019-08-28
Unit42
Non-Root Containers, Kubernetes CVE-2019-11245 and Why You Should Care2019-08-28

💬Community

1
Bugzilla
CVE-2019-11245 kubernetes: container uid changes to root after first restart2019-05-31
CVE-2019-11245 — Kubernetes CMD Kubelet vulnerability | cvebase