// For flags

CVE-2022-31077

Malicious response from KubeEdge can crash CSI Driver controller server

Severity Score

5.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. At the time of writing, no workaround exists.

KubeEdge está construido sobre Kubernetes y extiende la orquestación de aplicaciones nativas en contenedores y la administración de dispositivos a los hosts en el Edge. En las versiones afectadas, una respuesta de mensaje maliciosa de KubeEdge puede bloquear el servidor del controlador CSI desencadenando un pánico de desreferencia de puntero nil. Como consecuencia, el controlador CSI Driver entrará en denegación de servicio. Este error ha sido corregido en Kubeedge versiones 1.11.0, 1.10.1 y 1.9.3. Los usuarios deben actualizar a estas versiones para resolver el problema. En el momento de escribir esto, no se presenta ninguna mitigación

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-27 CVE Published
  • 2024-02-16 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
< 1.9.3
Search vendor "Linuxfoundation" for product "Kubeedge" and version " < 1.9.3"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
1.10.0
Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Kubeedge
Search vendor "Linuxfoundation" for product "Kubeedge"
1.10.0
Search vendor "Linuxfoundation" for product "Kubeedge" and version "1.10.0"
beta0
Affected