Hello Kubernetes Community,
A security vulnerability has been discovered in Kubernetes windows nodes that 
could allow a user with the ability to query a node's '/logs' endpoint to 
execute arbitrary commands on the host.

This issue has been rated Medium with a CVSS v3.1 score of 5.9 
(CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N>)
 and assigned CVE-2024-9042.

Am I vulnerable?
This CVE affects only Windows worker nodes. Your worker node is vulnerable to 
this issue if it is running one of the affected versions listed below.

Affected Components

  *   Kubelet

Affected Versions

  *   v1.32.0
  *   v1.31.0 to v1.31.4
  *   v1.30.0 to v1.30.8
  *   <=v1.29.12

How do I mitigate this vulnerability?
To mitigate this vulnerability, you need to upgrade the Kubelet on your Windows 
worker nodes to one of the fixed versions listed below.

Fixed Versions

  *   v1.32.1
  *   v1.31.5
  *   v1.30.9
  *   v1.29.13

Detection
To detect whether this vulnerability has been exploited, you can examine your 
cluster's audit logs to search for node 'logs' queries with suspicious inputs.

If you find evidence that this vulnerability has been exploited, please contact 
secur...@kubernetes.io<mailto:secur...@kubernetes.io>

Acknowledgements
This vulnerability was reported by Peled, Tomer and mitigated by Aravindh 
Puthiyaprambil.

Thank You,
Balaji on behalf of the Kubernetes Security Response Committee

Reply via email to