Microsoft Azure Kubernetes Service 机密容器权限提升漏洞
平台
kubernetes
组件
azure-kubernetes-service-confidential-container
修复版本
0.3.3
CVE-2024-21400 is a critical elevation of privilege vulnerability affecting Microsoft Azure Kubernetes Service Confidential Containers. This flaw allows an attacker to potentially escalate their privileges within the Kubernetes cluster. The vulnerability impacts versions 1.0.0 through 0.3.3, and a fix is available in version 0.3.3.
影响与攻击场景翻译中…
Successful exploitation of CVE-2024-21400 could allow an attacker to gain unauthorized access to sensitive data and resources within the Azure Kubernetes Service environment. An attacker could potentially compromise confidential containers, bypassing security measures designed to protect sensitive workloads. This could lead to data breaches, disruption of services, and further lateral movement within the cluster. The impact is particularly severe given the intended purpose of Confidential Containers – to isolate workloads and protect data in use.
利用背景翻译中…
This vulnerability was publicly disclosed on March 12, 2024. The CVSS score of 9.0 (CRITICAL) indicates a high probability of exploitation. Currently, there are no publicly available proof-of-concept exploits, but the severity warrants immediate attention and remediation. It is not listed on the CISA KEV catalog as of this writing.
哪些人处于风险中翻译中…
Organizations heavily reliant on Azure Kubernetes Service Confidential Containers for protecting sensitive workloads are at significant risk. This includes those deploying regulated data (e.g., HIPAA, PCI DSS) or handling intellectual property. Environments with misconfigured Kubernetes clusters or lacking robust network segmentation are particularly vulnerable.
检测步骤翻译中…
• kubernetes / server:
kubectl get pods -l aks.microsoft.com/confidential=true -o wide | grep 'Version:'• kubernetes / server:
kubectl describe pod <pod-name> | grep 'Confidential Container Runtime Version:'• kubernetes / server:
# Check for unusual pod configurations or resource requests
kubectl get pods --all-namespaces -o yaml | grep -i 'confidential'攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
1.20% (79% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 高 — 需要竞态条件、非默认配置或特定情况。难以可靠利用。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 已改变 — 攻击可以超出脆弱组件,影响其他系统。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2024-21400 is to upgrade Azure Kubernetes Service Confidential Containers to version 0.3.3 or later. If immediate upgrade is not possible, consider implementing stricter network policies and access controls within your Kubernetes cluster to limit the potential blast radius of a successful attack. Regularly review and audit your Kubernetes configurations to identify and address any potential misconfigurations that could be exploited. After upgrade, confirm by verifying the version of the Confidential Container runtime.
修复方法
将您的 Azure Kubernetes Service 更新到 0.3.3 或更高版本。这将修复权限提升漏洞。请参阅 Microsoft advisory 以获取有关更新的详细说明。
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2024-21400 — Elevation of Privilege in Azure Kubernetes Service?
CVE-2024-21400 is a critical vulnerability in Azure Kubernetes Service Confidential Containers allowing attackers to escalate privileges. It affects versions 1.0.0–0.3.3 and has a CVSS score of 9.0.
Am I affected by CVE-2024-21400 in Azure Kubernetes Service?
If you are using Azure Kubernetes Service Confidential Containers with versions between 1.0.0 and 0.3.3, you are potentially affected by this vulnerability. Check your version immediately.
How do I fix CVE-2024-21400 in Azure Kubernetes Service?
Upgrade Azure Kubernetes Service Confidential Containers to version 0.3.3 or later to resolve this vulnerability. If immediate upgrade is not possible, implement stricter network policies.
Is CVE-2024-21400 being actively exploited?
While no public exploits are currently available, the high CVSS score suggests a potential for exploitation, requiring immediate remediation.
Where can I find the official Azure advisory for CVE-2024-21400?
Refer to the Microsoft Security Update Guide for CVE-2024-21400: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400