// For flags

CVE-2023-23947

Argo CD users with any cluster secret update access may update out-of-bounds cluster secrets

Severity Score

8.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All Argo CD versions starting with 2.3.0-rc1 and prior to 2.3.17, 2.4.23 2.5.11, and 2.6.2 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret. The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters). A patch for this vulnerability has been released in Argo CD versions 2.6.2, 2.5.11, 2.4.23, and 2.3.17. Two workarounds are available. Either modify the RBAC configuration to completely revoke all `clusters, update` access, or use the `destinations` and `clusterResourceWhitelist` fields to apply similar restrictions as the `namespaces` and `clusterResources` fields.

A flaw was found in ArgoCD. An improper authorization bug may allow an attacker to update at least one cluster secret, enabling them to change any other cluster secret. The attacker must know the URL for the targeted cluster and additionally it should be authenticated within the ArgoCD API server with enough privileges to update at least one cluster. A successful attack may lead to privilege escalations or denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-19 CVE Reserved
  • 2023-02-16 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-09-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
>= 2.3.0 < 2.3.17
Search vendor "Linuxfoundation" for product "Argo-cd" and version " >= 2.3.0 < 2.3.17"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
>= 2.4.0 < 2.4.23
Search vendor "Linuxfoundation" for product "Argo-cd" and version " >= 2.4.0 < 2.4.23"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
>= 2.5.0 < 2.5.11
Search vendor "Linuxfoundation" for product "Argo-cd" and version " >= 2.5.0 < 2.5.11"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
>= 2.6.0 < 2.6.2
Search vendor "Linuxfoundation" for product "Argo-cd" and version " >= 2.6.0 < 2.6.2"
-
Affected