oss-sec mailing list archives

[kubernetes] CVE-2023-1174, CVE-2023-1944: Network port exposure and ssh access using default password


From: "Vellore Rajakumar, Sri Saran Balaji" <srajakum () amazon com>
Date: Wed, 19 Apr 2023 05:45:10 +0000

Hello Kubernetes Community,



We have released minikube v1.30.0<https://github.com/kubernetes/minikube/releases/tag/v1.30.0> to address two security 
issues in minikube. We recommend all to upgrade minikube to the latest version and delete any Kubernetes clusters 
created with an affected version. Minikube is a utility tool that sets up a Kubernetes environment on a local machine 
for developing and testing Kubernetes applications. Minikube is not intended for production use.



CVE-2023-1174: Network port exposure



This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected 
remote access to the minikube container. This issue has been rated CRITICAL 
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)
 (score: 9.8).



Am I vulnerable?

This CVE only affects clusters running on macOS with Docker drivers. If you have created the Kubernetes cluster using 
one of the below mentioned minikube versions, then you are affected by this vulnerability.



Affected Versions

• v1.28.0

• v1.27.1

• v1.27.0

• v1.26.1

• v1.26.0



You can also run the following command to know if you are affected. If the command returns 0.0.0.0 then you are 
affected by this vulnerability.

`docker inspect --format='{{(index (index .NetworkSettings.Ports "8443/tcp") 0).HostIp}}' minikube`



CVE-2023-1944: SSH access using default password



This vulnerability enables ssh access to minikube container using a default password. This issue has been rated HIGH 
(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)
 (score: 8.4).



Am I vulnerable?



All versions prior to v.1.30.0 are affected.



To find the version deployed in your environment, run the following command -

`minikube version`



How do I remediate these vulnerabilities?



To mitigate these vulnerabilities, you must upgrade minikube to the latest version and delete any clusters created 
using an affected version.



Fixed Version

• v1.30.0



Note: To delete clusters created using prior versions, run `minikube delete --all`



Thank You,

Balaji on behalf of the Kubernetes Security Response Committee



Current thread: