MEDIUM · 6.3

CVE-2020-8554

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker...

Vulnerability Description

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS Score

6.3

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
KubernetesKubernetesAll versions
OracleCommunications Cloud Native Core Network Slice Selection Function1.2.1
OracleCommunications Cloud Native Core Policy1.15.0
OracleCommunications Cloud Native Core Service Communication Proxy1.14.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-8554?

CVE-2020-8554 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker...

How severe is CVE-2020-8554?

CVE-2020-8554 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-8554?

Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Kubernetes, Oracle Communications Cloud Native Core Network Slice Selection Function, Oracle Communications Cloud Native Core Policy, Oracle Communications Cloud Native Core Service Communication Proxy.