FKIE_CVE-2020-2023

Vulnerability from fkie_nvd - Published: 2020-06-10 18:15 - Updated: 2024-11-21 05:24
Summary
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
References
psirt@paloaltonetworks.comhttps://github.com/kata-containers/agent/issues/791Third Party Advisory
psirt@paloaltonetworks.comhttps://github.com/kata-containers/agent/pull/792Patch
psirt@paloaltonetworks.comhttps://github.com/kata-containers/runtime/issues/2488Patch, Third Party Advisory
psirt@paloaltonetworks.comhttps://github.com/kata-containers/runtime/pull/2477Patch, Third Party Advisory
psirt@paloaltonetworks.comhttps://github.com/kata-containers/runtime/pull/2487Patch, Third Party Advisory
psirt@paloaltonetworks.comhttps://github.com/kata-containers/runtime/releases/tag/1.10.5Release Notes, Third Party Advisory
psirt@paloaltonetworks.comhttps://github.com/kata-containers/runtime/releases/tag/1.11.1Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/agent/issues/791Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/agent/pull/792Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/runtime/issues/2488Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/runtime/pull/2477Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/runtime/pull/2487Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/runtime/releases/tag/1.10.5Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kata-containers/runtime/releases/tag/1.11.1Release Notes, Third Party Advisory
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31",
              "versionEndIncluding": "1.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD1E8DE9-C5B6-4DA0-A5B2-A6C3B38DD2B6",
              "versionEndExcluding": "1.10.5",
              "versionStartIncluding": "1.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1358CC70-876F-4CA6-AC86-551883794212",
              "versionEndExcluding": "1.11.1",
              "versionStartIncluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Kata Containers doesn\u0027t restrict containers from accessing the guest\u0027s root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions."
    },
    {
      "lang": "es",
      "value": "Kata Containers no restringe el acceso de los contenedores al dispositivo del sistema de archivos root del invitado. Los contenedores maliciosos pueden explotar esto para obtener la ejecuci\u00f3n del c\u00f3digo en el invitado y hacerse pasar por el agente de kata. Este problema afecta a: Kata Containers versiones 1.11 anteriores a 1.11.1; Kata Containers  versiones 1.10 anteriores a 1.10.5; y Kata Containers  versiones 1.9 y anteriores"
    }
  ],
  "id": "CVE-2020-2023",
  "lastModified": "2024-11-21T05:24:28.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "psirt@paloaltonetworks.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 3.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-10T18:15:11.280",
  "references": [
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/agent/issues/791"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kata-containers/agent/pull/792"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/issues/2488"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/pull/2477"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/pull/2487"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5"
    },
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/agent/issues/791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kata-containers/agent/pull/792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/issues/2488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/pull/2477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/pull/2487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1"
    }
  ],
  "sourceIdentifier": "psirt@paloaltonetworks.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-250"
        }
      ],
      "source": "psirt@paloaltonetworks.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…