// For flags

CVE-2022-31076

Malicious Message can crash CloudCore in KubeEdge

Severity Score

5.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message can crash CloudCore by triggering a nil-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud. Additionally it will be affected only when users turn on the unixsocket switch in the config file cloudcore.yaml. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. Users unable to upgrade should sisable the unixsocket switch of CloudHub in the config file cloudcore.yaml.

KubeEdge se basa en Kubernetes y extiende la orquestación de aplicaciones en contenedores nativos y la administración de dispositivos a los hosts en el Edge. En versiones afectadas, un mensaje malicioso puede bloquear CloudCore al desencadenar una desreferencia de puntero nil en el servidor UDS. Dado que el servidor UDS sólo es comunicado con el controlador CSI en el lado de la nube, el ataque es limitado a la red local del host. Como tal, un atacante ya necesitaría ser un usuario autenticado de la Nube. Además, sólo será afectado cuando los usuarios activen el interruptor unixsocket en el archivo de configuración cloudcore.yaml. Este error ha sido corregido en Kubeedge versiones 1.11.0, 1.10.1 y 1.9.3. Los usuarios deben actualizar a estas versiones para resolver el problema. Los usuarios que no puedan actualizar deberán deshabilitar el interruptor unixsocket de CloudHub en el archivo de configuración cloudcore.yaml

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-27 CVE Published
  • 2024-01-18 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
< 1.9.3
Search vendor "Linuxfoundation" for product "Kubeedge" and version " < 1.9.3"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
1.10.0
Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
1.10.0
Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0"
beta0
Affected