Lucene search

K
hiveproHive ProHIVEPRO:565BC416BD5D5AC2050C2F77114ED0BD
HistoryMar 17, 2022 - 5:55 a.m.

Attackers Escape Kubernetes Containers using “cr8escape” Vulnerability in CRI-O

2022-03-1705:55:00
Hive Pro
www.hivepro.com
13
kubernetes
cr8escape vulnerability
cri-o
remote control
container escape
arbitrary code
kernel parameters
malware execution
data exfiltration
lateral movement
patch
mitre att&ck
resource development
capabilities
vulnerabilities
command interpreter
discovery
persistence
initial access
remote services vulnerability

EPSS

0.001

Percentile

46.8%

THREAT LEVEL: Red. For a detailed advisory, download the pdf file here. A flaw in CRI-O, an open-source Linux implementation of Kubernetes' Container Runtime Interface (CRI), was discovered that may allow an attacker to gain remote control of servers and potentially poison the container with attack code. The "cr8escape" vulnerability (CVE-2022-0811) allows an attacker to circumvent the host's defenses and set arbitrary kernel parameters. As a result, attackers with permissions to deploy a pod on a Kubernetes cluster using the CRI-O runtime can exploit the "kernel.core_pattern" parameter to accomplish container escape and run arbitrary code as root on any node in the cluster. This allows an attacker to carry out a range of operations on targets, including malware execution, data exfiltration, and lateral movement across pods. The vulnerability has been patched in CRI-O versions 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0. Potential MITRE ATT&CK TTPs are:TA0042: Resource DevelopmentT1588: Obtain CapabilitiesT1588.006: Obtain Capabilities: VulnerabilitiesTA0002: ExecutionT1059: Command and Scripting InterpreterTA0007: DiscoveryT1613: Container and Resource DiscoveryTA0003: PersistenceTA0001: Initial AccessT1133: External Remote Services Vulnerability Details Patch Link https://github.com/cri-o/cri-o/releases References https://www.crowdstrike.com/blog/cr8escape-new-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/