First published: Fri Mar 08 2019(Updated: )
Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Container Runtime | <0.28.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-3780.
The severity of CVE-2019-3780 is critical with a severity value of 8.8.
The affected software for CVE-2019-3780 is Cloudfoundry Container Runtime versions prior to 0.28.0.
A malicious user with access to the k8s nodes can obtain IAAS credentials allowing them to escalate privileges and gain access to the IAAS account.
Yes, there are references available for CVE-2019-3780. You can find them at the following URLs: http://www.securityfocus.com/bid/107434 and https://www.cloudfoundry.org/blog/cve-2019-3780.