Vulnerability Name: | CVE-2018-1000400 (CCN-143604) | ||||||||||||
Assigned: | 2018-05-18 | ||||||||||||
Published: | 2018-05-18 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-1000400 Source: BID Type: Third Party Advisory, VDB Entry 104262 Source: CCN Type: BID-104262 Kubernetes CRI-O CVE-2018-1000400 Remote Privilege Escalation Vulnerability Source: XF Type: UNKNOWN kubernetes-cve20181000400-priv-esc(143604) Source: CCN Type: kubernetes-incubator GIT Repository [1.9] Remove ambient capabilities #1558 Source: MISC Type: Patch, Third Party Advisory https://github.com/kubernetes-incubator/cri-o/pull/1558/files | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |