← Back to CVEs
CVE-2020-13597
MEDIUM6.0
Description
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod.
CVE Details
CVSS v3.1 Score6.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published6/3/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
projectcalico:calico
Weaknesses (CWE)
CWE-201CWE-200
References
https://github.com/kubernetes/kubernetes/issues/91507(psirt@tigera.io)
https://www.projectcalico.org/security-bulletins/(psirt@tigera.io)
https://github.com/kubernetes/kubernetes/issues/91507(af854a3a-2127-422b-91ae-364da2661108)
https://groups.google.com/forum/#%21topic/kubernetes-security-announce/BMb_6ICCfp8(af854a3a-2127-422b-91ae-364da2661108)
https://www.projectcalico.org/security-bulletins/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.