// For flags

CVE-2023-2431

Bypass of seccomp profile enforcement

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

A flaw was found in Kubernetes. This issue occurs when Kubernetes allows a local authenticated attacker to bypass security restrictions, caused by a flaw when using the localhost type for a seccomp profile but specifying an empty profile field. An attacker can bypass the seccomp profile enforcement by sending a specially crafted request.

*Credits: Tim Allclair, Craig Ingram
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-04-30 CVE Reserved
  • 2023-06-16 CVE Published
  • 2023-06-28 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-1287: Improper Validation of Specified Type of Input
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Kubernetes
Search vendor "Kubernetes"
Kubernetes
Search vendor "Kubernetes" for product "Kubernetes"
< 1.24.14
Search vendor "Kubernetes" for product "Kubernetes" and version " < 1.24.14"
-
Affected
Kubernetes
Search vendor "Kubernetes"
Kubernetes
Search vendor "Kubernetes" for product "Kubernetes"
>= 1.25.0 < 1.25.10
Search vendor "Kubernetes" for product "Kubernetes" and version " >= 1.25.0 < 1.25.10"
-
Affected
Kubernetes
Search vendor "Kubernetes"
Kubernetes
Search vendor "Kubernetes" for product "Kubernetes"
>= 1.26.0 < 1.26.5
Search vendor "Kubernetes" for product "Kubernetes" and version " >= 1.26.0 < 1.26.5"
-
Affected
Kubernetes
Search vendor "Kubernetes"
Kubernetes
Search vendor "Kubernetes" for product "Kubernetes"
>= 1.27.0 < 1.27.2
Search vendor "Kubernetes" for product "Kubernetes" and version " >= 1.27.0 < 1.27.2"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
38
Search vendor "Fedoraproject" for product "Fedora" and version "38"
-
Affected