• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers detail kubernetes vulnerability that enables windows node takeover

Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

You are here: Home / General Cyber Security News / Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover
March 14, 2024

Information have been manufactured public about a now-patched high-severity flaw in Kubernetes that could enable a destructive attacker to obtain remote code execution with elevated privileges underneath precise instances.

“The vulnerability lets distant code execution with System privileges on all Windows endpoints in just a Kubernetes cluster,” Akamai security researcher Tomer Peled said. “To exploit this vulnerability, the attacker desires to utilize destructive YAML files on the cluster.”

Tracked as CVE-2023-5528 (CVSS rating: 7.2), the shortcoming impacts all variations of kubelet, which includes and immediately after variation 1.8.. It was addressed as portion of updates unveiled on November 14, 2023, in the subsequent versions –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • kubelet v1.28.4
  • kubelet v1.27.8
  • kubelet v1.26.11, and
  • kubelet v1.25.16

“A security issue was discovered in Kubernetes wherever a user that can develop pods and persistent volumes on Windows nodes might be capable to escalate to admin privileges on those nodes,” Kubernetes maintainers stated in an advisory released at the time. “Kubernetes clusters are only afflicted if they are utilizing an in-tree storage plugin for Windows nodes.”

Cybersecurity

Effective exploitation of the flaw could consequence in a comprehensive takeover of all Windows nodes in a cluster. It is worth noting that a further set of related flaws was beforehand disclosed by the web infrastructure organization in September 2023.

The issue stems from the use of “insecure function phone and absence of user input sanitization,” and relates to element identified as Kubernetes volumes, specifically leveraging a volume kind known as local volumes that allow for buyers to mount disk partition in a pod by specifying or generating a PersistentVolume.

“When making a pod that incorporates a nearby volume, the kubelet provider will (sooner or later) achieve the operate ‘MountSensitive(),'” Peled described. “Inside it, there is a cmd line phone to ‘exec.command,’ which will make a symlink between the location of the quantity on the node and the locale within the pod.”

This supplies a loophole that an attacker can exploit by making a PersistentVolume with a specially crafted route parameter in the YAML file, which triggers command injection and execution by working with the “&&” command separator.

Cybersecurity

“In an work to clear away the prospect for injection, the Kubernetes workforce selected to delete the cmd phone, and change it with a indigenous GO operate that will carry out the similar operation ‘os.Symlink(),” Peled claimed of the patch set in put.

The disclosure arrives as a critical security flaw found in the close-of-everyday living (EoL) Zhejiang Uniview ISC camera product 2500-S (CVE-2024-0778, CVSS score: 9.8) is remaining exploited by menace actors to fall a Mirai botnet variant identified as NetKiller that shares infrastructure overlaps with a distinctive botnet named Condi.

“The Condi botnet source code was launched publicly on Github between August 17 and Oct 12, 2023,” Akamai stated. “Taking into consideration the Condi resource code has been readily available for months now, it is probably that other risk actors […] are utilizing it.”

Discovered this write-up appealing? Comply with us on Twitter  and LinkedIn to go through far more special articles we post.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «3 things cisos achieve with cato 3 Things CISOs Achieve with Cato
Next Post: LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada lockbit ransomware hacker ordered to pay $860,000 after guilty plea»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.