logo

CVE-2020-8558 k8s.io/kubernetes

Package

Manager: go
Name: k8s.io/kubernetes
Vulnerable Version: >=1.18.0 <1.18.4 || >=1.17.0 <1.17.7 || >=0 <1.16.11

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.24176 pctl0.95859

Details

Improper Authentication in Kubernetes A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.

Metadata

Created: 2022-02-15T01:57:18Z
Modified: 2023-01-06T22:23:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-wqv3-8cm6-h6wg/GHSA-wqv3-8cm6-h6wg.json
CWE IDs: ["CWE-420"]
Alternative ID: GHSA-wqv3-8cm6-h6wg
Finding: F332
Auto approve: 1