CRITICALCVE-2024-21400CVSS 9

Microsoft Azure Kubernetes Service 机密容器权限提升漏洞

平台

kubernetes

组件

azure-kubernetes-service-confidential-container

修复版本

0.3.3

AI Confidence: highNVDEPSS 1.2%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2024-21400 is a critical elevation of privilege vulnerability affecting Microsoft Azure Kubernetes Service Confidential Containers. This flaw allows an attacker to potentially escalate their privileges within the Kubernetes cluster. The vulnerability impacts versions 1.0.0 through 0.3.3, and a fix is available in version 0.3.3.

影响与攻击场景翻译中…

Successful exploitation of CVE-2024-21400 could allow an attacker to gain unauthorized access to sensitive data and resources within the Azure Kubernetes Service environment. An attacker could potentially compromise confidential containers, bypassing security measures designed to protect sensitive workloads. This could lead to data breaches, disruption of services, and further lateral movement within the cluster. The impact is particularly severe given the intended purpose of Confidential Containers – to isolate workloads and protect data in use.

利用背景翻译中…

This vulnerability was publicly disclosed on March 12, 2024. The CVSS score of 9.0 (CRITICAL) indicates a high probability of exploitation. Currently, there are no publicly available proof-of-concept exploits, but the severity warrants immediate attention and remediation. It is not listed on the CISA KEV catalog as of this writing.

哪些人处于风险中翻译中…

Organizations heavily reliant on Azure Kubernetes Service Confidential Containers for protecting sensitive workloads are at significant risk. This includes those deploying regulated data (e.g., HIPAA, PCI DSS) or handling intellectual property. Environments with misconfigured Kubernetes clusters or lacking robust network segmentation are particularly vulnerable.

检测步骤翻译中…

• kubernetes / server:

kubectl get pods -l aks.microsoft.com/confidential=true -o wide | grep 'Version:'

• kubernetes / server:

kubectl describe pod <pod-name> | grep 'Confidential Container Runtime Version:'

• kubernetes / server:

# Check for unusual pod configurations or resource requests
kubectl get pods --all-namespaces -o yaml | grep -i 'confidential'

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

1.20% (79% 百分位)

CISA SSVC

利用情况poc
可自动化no
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C9.0CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityHigh利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
高 — 需要竞态条件、非默认配置或特定情况。难以可靠利用。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件azure-kubernetes-service-confidential-container
供应商Microsoft
影响范围修复版本
1.0.0 – 0.3.30.3.3

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2024-21400 is to upgrade Azure Kubernetes Service Confidential Containers to version 0.3.3 or later. If immediate upgrade is not possible, consider implementing stricter network policies and access controls within your Kubernetes cluster to limit the potential blast radius of a successful attack. Regularly review and audit your Kubernetes configurations to identify and address any potential misconfigurations that could be exploited. After upgrade, confirm by verifying the version of the Confidential Container runtime.

修复方法

将您的 Azure Kubernetes Service 更新到 0.3.3 或更高版本。这将修复权限提升漏洞。请参阅 Microsoft advisory 以获取有关更新的详细说明。

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2024-21400 — Elevation of Privilege in Azure Kubernetes Service?

CVE-2024-21400 is a critical vulnerability in Azure Kubernetes Service Confidential Containers allowing attackers to escalate privileges. It affects versions 1.0.0–0.3.3 and has a CVSS score of 9.0.

Am I affected by CVE-2024-21400 in Azure Kubernetes Service?

If you are using Azure Kubernetes Service Confidential Containers with versions between 1.0.0 and 0.3.3, you are potentially affected by this vulnerability. Check your version immediately.

How do I fix CVE-2024-21400 in Azure Kubernetes Service?

Upgrade Azure Kubernetes Service Confidential Containers to version 0.3.3 or later to resolve this vulnerability. If immediate upgrade is not possible, implement stricter network policies.

Is CVE-2024-21400 being actively exploited?

While no public exploits are currently available, the high CVSS score suggests a potential for exploitation, requiring immediate remediation.

Where can I find the official Azure advisory for CVE-2024-21400?

Refer to the Microsoft Security Update Guide for CVE-2024-21400: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。