Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Researchers detail Kubernetes vulnerability that could lead to Windows node takeover
    Cyber Security

    Researchers detail Kubernetes vulnerability that could lead to Windows node takeover

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 14, 2024Editorial DepartmentContainer security/vulnerabilities

    Kubernetes vulnerabilities

    Details have been released about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execution with elevated privileges under certain circumstances.

    “The vulnerability allows remote code execution with system privileges on all Windows endpoints within the Kubernetes cluster,” said Akamai security researcher Tomer Peled. “To exploit this vulnerability, an attacker would need to apply a malicious YAML file on the cluster.”

    This flaw is tracked as CVE-2023-5528 (CVSS score: 7.2) and affects all versions of kubelet, including 1.8.0 and later versions. This issue has been resolved in the following versions as part of the update released on November 14, 2023 –

    • Cubelite v1.28.4
    • kubelet v1.27.8
    • kubelet v1.26.11, and
    • kubelet v1.25.16

    “A security issue has been discovered in Kubernetes whereby users who can create Pods and persistent volumes on Windows nodes may be able to escalate to administrator privileges on those nodes,” Kubernetes maintainers said in an advisory at the time. “Kubernetes Clustering is only affected when using Windows nodes to store plug-ins within the tree.”

    Internet security

    Successful exploitation of this flaw could result in a complete takeover of all Windows nodes in the cluster. Notably, the network infrastructure company previously revealed another set of similar flaws in September 2023.

    The issue stems from the use of “unsafe function calls and lack of user input sanitization” and is related to a feature called Kubernetes volumes, specifically leveraging a volume type called local volumes that allows users to Specify or create a persistent volume to mount the disk partition in the pod.

    “When creating a pod that contains a local volume, the kubelet service will (eventually) reach the function ‘MountSensitive()’,” Peled explained. “There is a command line call to ‘exec.command’ which creates a symbolic link between the volume location on the node and the location within the Pod.”

    This provides a vulnerability that an attacker can exploit by using specially crafted path parameters in the YAML file to create a PersistentVolume, thereby triggering command injection and execution using the “&&” command delimiter.

    Internet security

    “To eliminate the opportunity for injection, the Kubernetes team chose to remove the cmd call and replace it with a native GO function that will perform the same operation as ‘os.Symlink(),” Peled said of the installed patch.

    This disclosure comes as a critical security flaw discovered in Zhejiang Uniview ISC camera model 2500-S (CVE-2024-0778, CVSS score: 9.8) is being exploited by threat actors to deliver the Mirai botnet. The variant called NetKiller overlaps with a different botnet’s shared infrastructure called Condi.

    “Condi botnet source code was publicly released on Github between August 17 and October 12, 2023,” Akamai said. “Given that the Condi source code has been released for several months, it is likely that other threat actors […] is using it. “

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.