Arbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154

7.2HIGH

Summary

A vulnerability exists in the cri-o container runtime where attackers can inject arbitrary systemd properties through Pod annotations. This flaw allows any user with the capability to create a Pod to conduct unauthorized actions on the host system, posing significant security risks. Organizations utilizing affected versions of cri-o are advised to implement mitigations and updates to prevent potential exploitation.

Affected Version(s)

Red Hat OpenShift Container Platform 4.12 0:1.25.5-16.2.rhaos4.12.gitcb09013.el8

Red Hat OpenShift Container Platform 4.14 0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9

Red Hat OpenShift Container Platform 4.15 0:1.28.6-2.rhaos4.15.git77bbb1c.el8

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.
.