CVE-2022-31076
Malicious Message can crash CloudCore in KubeEdge
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message can crash CloudCore by triggering a nil-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud. Additionally it will be affected only when users turn on the unixsocket switch in the config file cloudcore.yaml. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. Users unable to upgrade should sisable the unixsocket switch of CloudHub in the config file cloudcore.yaml.
KubeEdge se basa en Kubernetes y extiende la orquestación de aplicaciones en contenedores nativos y la administración de dispositivos a los hosts en el Edge. En versiones afectadas, un mensaje malicioso puede bloquear CloudCore al desencadenar una desreferencia de puntero nil en el servidor UDS. Dado que el servidor UDS sólo es comunicado con el controlador CSI en el lado de la nube, el ataque es limitado a la red local del host. Como tal, un atacante ya necesitaría ser un usuario autenticado de la Nube. Además, sólo será afectado cuando los usuarios activen el interruptor unixsocket en el archivo de configuración cloudcore.yaml. Este error ha sido corregido en Kubeedge versiones 1.11.0, 1.10.1 y 1.9.3. Los usuarios deben actualizar a estas versiones para resolver el problema. Los usuarios que no puedan actualizar deberán deshabilitar el interruptor unixsocket de CloudHub en el archivo de configuración cloudcore.yaml
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-18 CVE Reserved
- 2022-06-27 CVE Published
- 2024-01-18 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/kubeedge/kubeedge/security/advisories/GHSA-8f4f-v9x5-cg6j | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/kubeedge/kubeedge/pull/3899/commits/5d60ae9eabd6b6b7afe38758e19bbe8137664701 | 2022-07-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Kubeedge Search vendor "Linuxfoundation" for product "Kubeedge" | < 1.9.3 Search vendor "Linuxfoundation" for product "Kubeedge" and version " < 1.9.3" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Kubeedge Search vendor "Linuxfoundation" for product "Kubeedge" | 1.10.0 Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Kubeedge Search vendor "Linuxfoundation" for product "Kubeedge" | 1.10.0 Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0" | beta0 |
Affected
|