Arbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154
7.2HIGH
Summary
A vulnerability exists in the cri-o container runtime where attackers can inject arbitrary systemd properties through Pod annotations. This flaw allows any user with the capability to create a Pod to conduct unauthorized actions on the host system, posing significant security risks. Organizations utilizing affected versions of cri-o are advised to implement mitigations and updates to prevent potential exploitation.
Affected Version(s)
Red Hat OpenShift Container Platform 4.12 0:1.25.5-16.2.rhaos4.12.gitcb09013.el8
Red Hat OpenShift Container Platform 4.14 0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9
Red Hat OpenShift Container Platform 4.15 0:1.28.6-2.rhaos4.15.git77bbb1c.el8
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Credit
Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.