First published: Tue Oct 11 2022(Updated: )
<p>Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Arc-enabled Kubernetes | =1.5.8 | |
Microsoft Azure Arc-enabled Kubernetes | =1.6.19 | |
Microsoft Azure Arc-enabled Kubernetes | =1.7.18 | |
Microsoft Azure Arc-enabled Kubernetes | =1.8.11 | |
Microsoft Azure Stack Edge | ||
Microsoft Azure Stack Edge | ||
Microsoft Azure Arc-enabled Kubernetes cluster 1.7.18 | ||
Microsoft Azure Arc-enabled Kubernetes cluster 1.5.8 | ||
Microsoft Azure Arc-enabled Kubernetes cluster 1.8.11 | ||
Microsoft Azure Arc-enabled Kubernetes cluster 1.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37968 has been classified as a critical vulnerability due to its potential to allow unauthenticated users to gain administrative control over Azure Arc-enabled Kubernetes clusters.
To mitigate CVE-2022-37968, users should upgrade to the latest version of Azure Arc-enabled Kubernetes clusters as specified in the Microsoft security advisory.
CVE-2022-37968 affects Azure Arc-enabled Kubernetes clusters versions 1.5.8, 1.6.19, 1.7.18, and 1.8.11, along with Azure Stack Edge.
Yes, CVE-2022-37968 can be exploited remotely, allowing attackers to elevate privileges without authentication.
Yes, organizations using Azure Arc-enabled Kubernetes should be concerned as this vulnerability poses significant risks of unauthorized access and control.