First published: Wed Nov 10 2021(Updated: )
An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Konveyor Mig-controller | <1.5.2 | |
Konveyor Mig-controller | >=1.6.0<1.6.3 | |
Redhat Migration Toolkit | =1.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Migration Toolkit | =1.5 | |
Redhat Migration Toolkit | =1.6 | |
redhat/konveyor/mig-controller release | <1.5.2 | 1.5.2 |
redhat/konveyor/mig-controller release | <1.6.3 | 1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3948 is an incorrect default permissions vulnerability found in the mig-controller.
CVE-2021-3948 can allow an attacker to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.
Software affected by CVE-2021-3948 includes Konveyor Mig-controller versions up to 1.5.2, Konveyor Mig-controller versions between 1.6.0 and 1.6.3, and Redhat Migration Toolkit version 1.0.
CVE-2021-3948 has a severity score of 6.3, which is considered medium.
To fix CVE-2021-3948, it is recommended to update to the latest version of the affected software.