Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical vulnerability in Kubernetes Image Builder puts nodes at risk of root access
Global Security

Critical vulnerability in Kubernetes Image Builder puts nodes at risk of root access

AdminBy AdminOctober 17, 2024No Comments3 Mins Read
Kubernetes Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 17, 2024Ravi LakshmananVulnerability / Kubernetes

Kubernetes Vulnerability

A critical security flaw has been discovered in Kubernetes Image Builder that, if successfully exploited, could be used to gain root access under certain circumstances.

Vulnerability, tracked as CVE-2024-9486 (CVSS score: 9.8), considered in version 0.1.38. The project maintainers thanked Mykola Rybnikar for discovering and reporting the vulnerability.

“A security issue has been identified in Kubernetes Image Builder where default credentials are enabled during the image build process,” Joel Smith of Red Hat said in the notice.

“Additionally, virtual machine images created using the Proxmox provider do not disable these default credentials, and nodes using the resulting images can be accessed through these default credentials. Credentials can be used to gain root access.”

Cyber ​​security

However, Kubernetes clusters are only affected by the flaw if their nodes use virtual machine (VM) images created through the Image Builder project with the Proxmox vendor.

As a temporary mitigation, it was recommended to disable the designer account on the affected VMs. Users are also advised to restore damaged images using a fixed version of Image Builder and redeploy them to virtual machines.

A fix introduced by the Kubernetes team avoids the default credentials for a randomly generated password that is set at image build time. Additionally, the builder account is disabled at the end of the image creation process.

Kubernetes Image Builder version 0.1.38 also addresses a related question (CVE-2024-9594, CVSS score: 6.3) regarding default credentials when image builds are built using Nutanix, OVA, QEMU, or raw providers.

The lower severity level for CVE-2024-9594 results from the fact that virtual machines that use images created using these providers only affected “if an attacker was able to reach the virtual machine where the image build was taking place and used the vulnerability to modify the image while the image build was taking place.”

This development comes after Microsoft released server patches for three critical vulnerabilities in Dataverse, Imagine Cup and Power Platform that could lead to elevation of privilege and information disclosure –

  • CVE-2024-38139 (CVSS Score: 8.7) – Improper authentication to Microsoft Dataverse allows an authorized attacker to elevate network privileges
  • CVE-2024-38204 (CVSS Score: 7.5) – Improper access controls in Imagine Cup allow an authorized attacker to elevate network privileges
  • CVE-2024-38190 (CVSS Score: 8.6) – Lack of authorization in Power Platform allows an unauthenticated attacker to view sensitive information via a network attack vector

It also follows the disclosure of a critical vulnerability in the open-source enterprise search engine Apache Solr (CVE-2024-45216, CVSS score: 9.8) that could open the way for authentication to be bypassed in vulnerable cases.

Cyber ​​security

“A false end at the end of any Solr API URL path will allow requests to bypass authentication while maintaining the API contract with the original URL path”, GitHub consultation for the shortcomings of states. “This fake endpoint looks like an unsecured API path, however it is removed internally after authentication but before API routing.”

The issue affecting Solr versions 5.3.0 to 8.11.4 and 9.0.0 to 9.7.0 has been fixed in versions 8.11.4 and 9.7.0 respectively.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.