← Volver a CVEs
CVE-2023-33190
CRITICAL9.9
Descripcion
Sealos is an open source cloud operating system distribution based on the Kubernetes kernel. In versions of Sealos prior to 4.2.1-rc4 an improper configuration of role based access control (RBAC) permissions resulted in an attacker being able to obtain cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. This issue has been addressed in version 4.2.1-rc4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Detalles CVE
Puntuacion CVSS v3.19.9
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/29/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
sealos_project:sealos
Debilidades (CWE)
CWE-287CWE-863
Referencias
https://github.com/labring/sealos/commit/4cdf52e55666864e5f90ed502e9fc13e18985b7b(security-advisories@github.com)
https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62(security-advisories@github.com)
https://github.com/labring/sealos/commit/4cdf52e55666864e5f90ed502e9fc13e18985b7b(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.