Lucene search

K
cveKubernetesCVE-2023-3893
HistoryNov 03, 2023 - 6:15 p.m.

CVE-2023-3893

2023-11-0318:15:08
CWE-20
kubernetes
web.nvd.nist.gov
64
kubernetes
security
vulnerability
cve-2023-3893
windows nodes
privilege escalation

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

26.8%

A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.

Affected configurations

Nvd
Node
kubernetescsi_proxyRange1.1.2
OR
kubernetescsi_proxyMatch2.0.0alpha0
VendorProductVersionCPE
kubernetescsi_proxy*cpe:2.3:a:kubernetes:csi_proxy:*:*:*:*:*:*:*:*
kubernetescsi_proxy2.0.0cpe:2.3:a:kubernetes:csi_proxy:2.0.0:alpha0:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "csi-proxy",
    "repo": "https://github.com/kubernetes-csi/csi-proxy",
    "vendor": "Kubernetes",
    "versions": [
      {
        "status": "affected",
        "version": "v2.0.0-alpha.0"
      },
      {
        "lessThanOrEqual": "v1.1.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "v2.0.0-alpha.1"
      },
      {
        "status": "unaffected",
        "version": "v1.1.3"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

26.8%