CVE-2019-9946
Published Apr 2, 2019
Last updated a year ago
Overview
- Description
- Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-670
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:*", "vulnerable": true, "matchCriteriaId": "AAC9C18B-C6AB-43D0-8BD9-ACC4158DF9FD", "versionEndExcluding": "0.7.5" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADC981F6-485E-4804-8BA2-640DA55FE1D9", "versionEndExcluding": "1.11.9" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDF6BA38-1A7C-46AB-A404-06ABB3ADFFC7", "versionEndExcluding": "1.12.7", "versionStartIncluding": "1.12.0" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "147CD8D3-60A8-4314-AD92-670CB330F85C", "versionEndExcluding": "1.13.5", "versionStartIncluding": "1.13.0" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CC774DD-08F0-4AC4-A0A9-67F86A7ED2E5" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34A6AC2D-82C4-4E1F-8D9A-159E31A4F790" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "002991E8-6CC8-4F58-89B3-0B1AF2447DD5" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EA02FED-0377-4E4B-A86F-EE44F0E27360" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1496A02B-29F5-4DD5-B9FE-B39C5B77E8CF" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59D7C9A1-A467-46A5-A03E-A04BD35287C7" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41BF2E7F-E6DB-4ED0-B943-247B4F592C7E" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF0406C1-854E-4B4D-AC1E-7DE304356030" }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "300E9B49-446B-406C-B219-360BD97D6EC1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26FCA75B-4282-4E0F-95B4-640A82C8E91C" } ], "operator": "OR" } ] } ]