Vulnerability Description
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cloudfoundry | Container Runtime | < 0.29.0 |
Related Weaknesses (CWE)
References
- https://www.cloudfoundry.org/blog/cve-2019-3779Vendor Advisory
- https://www.cloudfoundry.org/blog/cve-2019-3779Vendor Advisory
FAQ
What is CVE-2019-3779?
CVE-2019-3779 is a vulnerability with a CVSS score of 8.8 (HIGH). Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This ...
How severe is CVE-2019-3779?
CVE-2019-3779 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3779?
Check the references section above for vendor advisories and patch information. Affected products include: Cloudfoundry Container Runtime.