First published: Fri Mar 08 2019(Updated: )
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Container Runtime | <0.29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3779 is a vulnerability in Cloud Foundry Container Runtime that allows a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes API.
CVE-2019-3779 has a severity rating of 8.8 (high).
Cloud Foundry Container Runtime versions prior to 0.29.0 are affected by CVE-2019-3779.
To fix CVE-2019-3779, update Cloud Foundry Container Runtime to version 0.29.0 or later.
You can find more information about CVE-2019-3779 at the following link: [Cloud Foundry Blog](https://www.cloudfoundry.org/blog/cve-2019-3779).