// For flags

CVE-2020-8569

Kubernetes CSI snapshot-controller DoS

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

< 1%
*EPSS

Affected Versions

2
*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected.

Kubernetes CSI snapshot-controller versiones v2.1.3 y v3.0.2, podía entrar en pánico al procesar un recurso personalizado VolumeSnapshot cuando: - El VolumeSnapshot hacía referencia a un PersistentVolumeClaim no existente y el VolumeSnapshot no hacía referencia a ningún VolumeSnapshotClass. - El snapshot-controller se bloquea, Kubernetes lo reinicia automáticamente y procesa el mismo recurso personalizado de VolumeSnapshot después del reinicio, ingresando en un bucle de bloqueo sin fin. Esta vulnerabilidad solo afecta a la funcionalidad volume snapshot. Cuando se explotaba, los usuarios no pueden tomar instantáneas de sus volúmenes o eliminar las instantáneas. Todas las demás funciones de Kubernetes no están afectadas

*Credits: Qin Ping
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-02-03 CVE Reserved
  • 2021-01-21 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • 2025-04-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions (2)