First published: Tue Jul 16 2019(Updated: )
A flaw was discovered in OpenShift Container Platform 4 where, by default, users with access to create pods also have the ability to schedule workloads on master nodes. Pods with permission to access the host network, running on master nodes, can retrieve security credentials for the master AWS IAM role, allowing management access to AWS resources. With access to the security credentials, the user then has access to the entire infrastructure. Impact to data and system availability is high.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10200 has been classified as a high severity vulnerability due to its potential impact on cluster security.
To fix CVE-2019-10200, you should restrict pod security contexts and ensure that users do not have permissions to schedule workloads on master nodes.
The potential risks of CVE-2019-10200 include unauthorized access to AWS IAM security credentials and increased attack surface on master nodes.
CVE-2019-10200 affects version 4.0 of the OpenShift Container Platform.
Yes, CVE-2019-10200 can potentially lead to data breaches if malicious users exploit the vulnerability to gain access to sensitive information.