CVE-2023-2431 Vulnerability Details

  /     /     /  

CVE-2023-2431 Metadata Quick Info

CVE Published: 16/06/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: kubernetes | Vendor: Kubernetes | Product: Kubernetes
Status : PUBLISHED

CVE-2023-2431 Description

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

Metrics

CVSS Version: 3.1 | Base Score: 3.4 LOW
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* HIGH
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* LOW
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-1287
CWE Name: CWE-1287 Improper Validation of Specified Type of Input
Source: Kubernetes

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).