Critical Vulnerability in Kubernetes
History:
- 17/10/2024 --- v1.0 -- Initial publication
Summary
On October 14, 2024, Kubernetes released a security advisory addressing a critical vulnerability affecting the Kubernetes Image Builder project [1,2].
It is recommended updating the Kubernetes Image Builder, and redeploying or mitigating Virtual Machines (VMs) created by the vulnerable Kubernetes Image Builder.
Technical Details
The flaw affects Kubernetes Image Builder version 0.1.37 and earlier. It enables root access via SSH using default credentials on VMs built with the vulnerable version of Kubernetes Image Builder [2].
For images built with the Proxmox provider, the vulnerability has been assigned CVE-2024-9486
, with a CVSS score of 9.8.
For images built with the Nutanix, OVA, QEMU or raw providers, the vulnerability has been assigned CVE-2024-9594
, with a CVSS of 6.3.
Affected Products
This flaw affects:
- Kubernetes Image Builder v0.1.37 and earlier;
- VM images built the vulnerable version of Kubernetes Image Builder.
Recommendations
It is strongly recommended updating the Kubernetes Image Builder and redeploying VMs created by the vulnerable Kubernetes Image Builder.
Mitigations
It is possible to mitigate the vulnerability in affected VMs by disabling the builder
account: usermod -L builder
Detection
The Linux command last builder
can be used to view logins to the affected builder
account.