First published: Mon Jan 11 2021(Updated: )
An insecure modification flaw in the /etc/kubernetes/kubeconfig file was found in OpenShift. This flaw allows an attacker with access to a running container which mounts /etc/kubernetes or has local access to the node, to copy this kubeconfig file and attempt to add their own node to the OpenShift cluster. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects versions before openshift4/ose-machine-config-operator v4.7.0-202105111858.p0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | <4.7.0 | |
Red Hat OpenShift | =4.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35514 has been rated as a high severity vulnerability due to the potential for unauthorized access and exploitation.
To mitigate CVE-2020-35514, ensure that proper permissions and access controls are in place for the /etc/kubernetes/kubeconfig file.
CVE-2020-35514 affects Red Hat OpenShift versions prior to 4.7.0.
CVE-2020-35514 describes an insecure modification flaw that can be exploited by attackers with node or container access.
CVE-2020-35514 can allow an attacker to manipulate the kubeconfig file and potentially add unauthorized nodes to the OpenShift cluster.