Kubernetes - Windows nodes - Insufficient input sanitization leads to privilege escalation
CVE-2023-3676
8.8HIGH
Summary
A security issue has been identified in Kubernetes that potentially allows users with pod creation permissions on Windows nodes to escalate their privileges to admin level. This vulnerability poses a risk specifically for Kubernetes clusters that integrate Windows nodes, as it can lead to unauthorized access and control over the affected nodes, potentially compromising the entire cluster's security.
Affected Version(s)
kubelet v1.28.0
kubelet v1.27.0
kubelet v1.26.0
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Tomer Peled