First published: Wed Aug 23 2023(Updated: )
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Csi Proxy | <=1.1.2 | |
Kubernetes Csi Proxy | =2.0.0-alpha0 | |
go/github.com/kubernetes-csi/csi-proxy | <=1.1.2 | 1.1.3 |
go/github.com/kubernetes-csi/csi-proxy | =2.0.0-alpha.0 | 2.0.0-alpha.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3893 is a vulnerability in Kubernetes where a user can escalate to admin privileges on Windows nodes running kubernetes-csi-proxy.
Kubernetes clusters are affected if they include Windows nodes running kubernetes-csi-proxy.
The severity of CVE-2023-3893 is high, with a severity value of 8.8.
To fix CVE-2023-3893, upgrade to kubernetes-csi-proxy version 1.1.3 or 2.0.0-alpha.1, depending on the affected version.
You can find more information about CVE-2023-3893 at the following references: - [GitHub Issue](https://github.com/kubernetes/kubernetes/issues/119594) - [Google Groups Announcement](https://groups.google.com/g/kubernetes-security-announce/c/lWksE2BoCyQ) - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-3893)