Vulnerability Name:

CVE-2022-1706 (CCN-226852)

Assigned:2022-05-04
Published:2022-05-04
Updated:2022-10-11
Summary:A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): Low
Availibility (A): Low
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.7 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-863
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-1706

Source: CCN
Type: Red Hat Bugzilla - Bug 2082274
(CVE-2022-1706) - CVE-2022-1706 ignition: configs are accessible from unprivileged containers in VMs running on VMware products

Source: MISC
Type: Issue Tracking, Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2082274

Source: XF
Type: UNKNOWN
ignition-cve20221706-info-disc(226852)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/coreos/ignition/commit/4b70b44b430ecf8377a276e89b5acd3a6957d4ea

Source: CCN
Type: Ignition GIT Repository
Security when using vmware to store the ignition config? #1300

Source: MISC
Type: Third Party Advisory
https://github.com/coreos/ignition/issues/1300

Source: MISC
Type: Third Party Advisory
https://github.com/coreos/ignition/issues/1315

Source: MISC
Type: Third Party Advisory
https://github.com/coreos/ignition/pull/1350

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-7846cac830

Source: FEDORA
Type: Mailing List, Patch, Third Party Advisory
FEDORA-2022-393948cc9e

Source: FEDORA
Type: Mailing List, Patch, Third Party Advisory
FEDORA-2022-5df5dc8ec5

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:ignition:*:*:*:*:*:*:*:* (Version < 2.14.0)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20228126
    P
    RHSA-2022:8126: ignition security, bug fix, and enhancement update (Moderate)
    2022-11-15
    oval:org.opensuse.security:def:703
    P
    Security update for systemd-presets-common-SUSE (Moderate)
    2022-08-22
    oval:org.opensuse.security:def:95268
    P
    Security update for systemd-presets-common-SUSE (Moderate) (in QA)
    2022-07-13
    oval:org.opensuse.security:def:42320
    P
    Security update for systemd-presets-common-SUSE (Moderate) (in QA)
    2022-07-13
    oval:org.opensuse.security:def:43646
    P
    Security update for systemd-presets-common-SUSE (Moderate) (in QA)
    2022-07-13
    oval:org.opensuse.security:def:3638
    P
    Security update for systemd-presets-common-SUSE (Moderate) (in QA)
    2022-07-13
    oval:org.opensuse.security:def:42415
    P
    Security update for systemd-presets-common-SUSE (Moderate) (in QA)
    2022-07-13
    oval:org.opensuse.security:def:43641
    P
    Security update for ignition (Moderate)
    2022-07-11
    oval:org.opensuse.security:def:42408
    P
    Security update for ignition (Moderate)
    2022-07-11
    oval:org.opensuse.security:def:42313
    P
    Security update for ignition (Moderate)
    2022-07-11
    BACK
    redhat openshift container platform 4.0
    redhat enterprise linux 9.0
    redhat ignition *
    fedoraproject fedora 34
    fedoraproject fedora 35
    fedoraproject fedora 36