CVE-2023-3676Improper Input Validation in Kubernetes

Severity
8.8HIGHNVD
EPSS
40.7%
top 2.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 31
Latest updateAug 21

Description

A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

Gok8s.io/kubernetes1.28.01.28.1+4
NVDkubernetes/kubernetes1.25.01.25.13+4
Debiankubernetes/kubernetes< 1.20.5+really1.20.2-1+3
CVEListV5kubernetes/kubeletv1.27.0v1.27.4+4

Patches

🔴Vulnerability Details

5
OSV
Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes2024-08-21
OSV
Kubernetes privilege escalation vulnerability2023-10-31
CVEList
Kubernetes - Windows nodes - Insufficient input sanitization leads to privilege escalation2023-10-31
OSV
CVE-2023-3676: A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those2023-10-31
GHSA
Kubernetes privilege escalation vulnerability2023-10-31

📋Vendor Advisories

2
Red Hat
kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation2023-08-23
Debian
CVE-2023-3676: kubernetes - A security issue was discovered in Kubernetes where a user that can create pods...2023
CVE-2023-3676 — Improper Input Validation in Kubernetes | cvebase