ID CVE-2020-8554
Summary Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
References
Vulnerable Configurations
  • cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
    cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 29-10-2022 - 02:41)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
redhat via4
rpms
  • atomic-enterprise-service-catalog-1:3.11.374-1.git.1675.738abcc.el7
  • atomic-enterprise-service-catalog-svcat-1:3.11.374-1.git.1675.738abcc.el7
  • atomic-openshift-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-clients-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-clients-redistributable-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-cluster-autoscaler-0:3.11.374-1.git.0.2996f62.el7
  • atomic-openshift-descheduler-0:3.11.374-1.git.299.f128e96.el7
  • atomic-openshift-docker-excluder-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-dockerregistry-0:3.11.374-1.git.481.e6a880c.el7
  • atomic-openshift-excluder-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-hyperkube-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-hypershift-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-master-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-metrics-server-0:3.11.374-1.git.53.9df25a9.el7
  • atomic-openshift-node-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-node-problem-detector-0:3.11.374-1.git.263.28335fb.el7
  • atomic-openshift-pod-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-sdn-ovs-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-service-idler-0:3.11.374-1.git.15.523a1f7.el7
  • atomic-openshift-template-service-broker-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-tests-0:3.11.374-1.git.0.ebd3ee9.el7
  • atomic-openshift-web-console-0:3.11.374-1.git.647.9e78d83.el7
  • golang-github-openshift-oauth-proxy-0:3.11.374-1.git.439.966c536.el7
  • openshift-ansible-0:3.11.374-1.git.0.92f5956.el7
  • openshift-ansible-docs-0:3.11.374-1.git.0.92f5956.el7
  • openshift-ansible-playbooks-0:3.11.374-1.git.0.92f5956.el7
  • openshift-ansible-roles-0:3.11.374-1.git.0.92f5956.el7
  • openshift-ansible-test-0:3.11.374-1.git.0.92f5956.el7
  • openshift-enterprise-autoheal-0:3.11.374-1.git.218.9cf7939.el7
  • openshift-enterprise-cluster-capacity-0:3.11.374-1.git.379.80bd08f.el7
  • openshift-kuryr-cni-0:3.11.374-1.git.1478.ef11824.el7
  • openshift-kuryr-common-0:3.11.374-1.git.1478.ef11824.el7
  • openshift-kuryr-controller-0:3.11.374-1.git.1478.ef11824.el7
  • prometheus-0:3.11.374-1.git.5026.29379c4.el7
  • prometheus-alertmanager-0:3.11.374-1.git.0.3abd2a5.el7
  • prometheus-node-exporter-0:3.11.374-1.git.1062.490d6d5.el7
  • python2-kuryr-kubernetes-0:3.11.374-1.git.1478.ef11824.el7
  • python2-urllib3-0:1.26.2-1.el7
refmap via4
misc
Last major update 29-10-2022 - 02:41
Published 21-01-2021 - 17:15
Last modified 29-10-2022 - 02:41
Back to Top