logo

CVE-2020-14316 kubevirt.io/kubevirt

Package

Manager: go
Name: kubevirt.io/kubevirt
Vulnerable Version: >=0 <0.30.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00393 pctl0.59483

Details

Privilege Escalation in kubevirt A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Metadata

Created: 2024-04-24T20:54:37Z
Modified: 2024-04-24T20:54:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-828r-r2c8-rfw3/GHSA-828r-r2c8-rfw3.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-828r-r2c8-rfw3
Finding: F159
Auto approve: 1