CVE-2020-8554 — Unverified Ownership in Kubernetes
Severity
5.0MEDIUMNVD
CNA6.3
EPSS
24.8%
top 3.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 21
Latest updateApr 15
Description
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 1.6 | Impact: 3.4
Affected Packages6 packages
Patches
🔴Vulnerability Details
4OSV▶
CVE-2020-8554: Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec↗2021-01-21
📋Vendor Advisories
5Debian▶
CVE-2020-8554: kubernetes - Kubernetes API server in all versions allow an attacker who is able to create a ...↗2020