CVE-2020-14316 – kubevirt.io/kubevirt
Package
Manager: go
Name: kubevirt.io/kubevirt
Vulnerable Version: >=0 <0.30.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00393 pctl0.59483
Details
Privilege Escalation in kubevirt A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Metadata
Created: 2024-04-24T20:54:37Z
Modified: 2024-04-24T20:54:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-828r-r2c8-rfw3/GHSA-828r-r2c8-rfw3.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-828r-r2c8-rfw3
Finding: F159
Auto approve: 1