MEDIUM · 6.0

CVE-2020-10749

A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A ma...

Vulnerability Description

A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.

CVSS Score

6.0

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
LinuxfoundationCni Network Plugins< 0.8.6
RedhatOpenshift Container Platform4.0
FedoraprojectFedora32
RedhatEnterprise Linux7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-10749?

CVE-2020-10749 is a vulnerability with a CVSS score of 6.0 (MEDIUM). A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A ma...

How severe is CVE-2020-10749?

CVE-2020-10749 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-10749?

Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Cni Network Plugins, Redhat Openshift Container Platform, Fedoraproject Fedora, Redhat Enterprise Linux.