CVE-2020-8562Time-of-check Time-of-use (TOCTOU) Race Condition in Kubernetes

Severity
3.1LOWNVD
CNA6.3GHSA6.3OSV6.3
EPSS
0.1%
top 82.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 1
Latest updateAug 21

Description

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.6 | Impact: 1.4

Affected Packages4 packages

Debiankubernetes/kubernetes< 1.20.5+really1.20.2-1+3
Gok8s.io/kubernetes1.21.01.21.1+3
CVEListV5kubernetes/kubernetesunspecifiedv1.18.18+3
NVDkubernetes/kubernetes1.19.01.19.10+3

🔴Vulnerability Details

5
OSV
WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes2024-08-21
OSV
Potential proxy IP restriction bypass in Kubernetes2022-02-02
GHSA
Potential proxy IP restriction bypass in Kubernetes2022-02-02
CVEList
Bypass of Kubernetes API Server proxy TOCTOU2022-02-01
OSV
CVE-2020-8562: As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost netw2022-02-01

📋Vendor Advisories

2
Red Hat
kubernetes: Bypass of Kubernetes API Server proxy TOCTOU2021-05-04
Debian
CVE-2020-8562: kubernetes - As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to p...2020
CVE-2020-8562 — Kubernetes vulnerability | cvebase