• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: new kubernetes vulnerabilities enable remote attacks on windows endpoints

Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints

You are here: Home / General Cyber Security News / Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints
September 13, 2023

3 interrelated large-severity security flaws uncovered in Kubernetes could be exploited to attain distant code execution with elevated privileges on Windows endpoints in just a cluster.

The issues, tracked as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, carry CVSS scores of 8.8 and impact all Kubernetes environments with Windows nodes. Fixes for the vulnerabilities have been produced on August 23, 2023, next accountable disclosure by Akamai on July 13, 2023.

“The vulnerability lets remote code execution with Technique privileges on all Windows endpoints inside a Kubernetes cluster,” Akamai security researcher Tomer Peled claimed in a complex create-up shared with The Hacker News. “To exploit this vulnerability, the attacker needs to apply a destructive YAML file on the cluster.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Amazon Web Services (AWS), Google Cloud, and Microsoft Azure have all launched advisories for the bugs, which impact the next versions of Kubelet –

  • kubelet < v1.28.1
  • kubelet < v1.27.5
  • kubelet < v1.26.8
  • kubelet < v1.25.13, and
  • kubelet < v1.24.17

In a nutshell, CVE-2023-3676 allows an attacker with ‘apply’ privileges — which makes it possible to interact with the Kubernetes API — to inject arbitrary code that will be executed on remote Windows equipment with Technique privileges.

“CVE-2023-3676 needs small privileges and, hence, sets a small bar for attackers: All they have to have to have is access to a node and use privileges,” Peled famous.

Approaching WEBINARIdentity is the New Endpoint: Mastering SaaS Security in the Fashionable Age

Dive deep into the potential of SaaS security with Maor Bin, CEO of Adaptive Shield. Find out why id is the new endpoint. Secure your place now.

Supercharge Your Capabilities

The vulnerability, together with CVE-2023-3955, occurs as a end result of a deficiency of input sanitization, thereby enabling a specifically crafted route string to be parsed as a parameter to a PowerShell command, correctly foremost to command execution.

CVE-2023-3893, on the other hand, relates to a scenario of privilege escalation in the Container Storage Interface (CSI) proxy that makes it possible for a destructive actor to get hold of administrator access on the node.

“A recurring concept between these vulnerabilities is a lapse in enter sanitization in the Windows-particular porting of the Kubelet,” Kubernetes Security system ARMO highlighted very last thirty day period.

“Specially, when dealing with Pod definitions, the computer software fails to sufficiently validate or sanitize person inputs. This oversight enables destructive consumers to craft pods with ecosystem variables and host paths that, when processed, direct to undesired behaviors, this kind of as privilege escalation.”

Observed this report intriguing? Comply with us on Twitter  and LinkedIn to go through more special written content we submit.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «researchers detail 8 vulnerabilities in azure hdinsight analytics service Researchers Detail 8 Vulnerabilities in Azure HDInsight Analytics Service
Next Post: Russian Journalist’s iPhone Compromised by NSO Group’s Zero-Click Spyware russian journalist's iphone compromised by nso group's zero click spyware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.