← Voltar para CVEs
CVE-2020-10749
MEDIUM6.0
Descricao
A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
Detalhes CVE
Pontuacao CVSS v3.16.0
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado6/3/2020
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
fedoraproject:fedoralinuxfoundation:cni_network_pluginsredhat:enterprise_linuxredhat:openshift_container_platform
Fraquezas (CWE)
CWE-300
Referencias
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749(secalert@redhat.com)
https://groups.google.com/forum/#%21topic/kubernetes-security-announce/BMb_6ICCfp8(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC/(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749(af854a3a-2127-422b-91ae-364da2661108)
https://groups.google.com/forum/#%21topic/kubernetes-security-announce/BMb_6ICCfp8(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.