Vulnerability Description
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubernetes | Kubernetes | All versions |
| Oracle | Communications Cloud Native Core Network Slice Selection Function | 1.2.1 |
| Oracle | Communications Cloud Native Core Policy | 1.15.0 |
| Oracle | Communications Cloud Native Core Service Communication Proxy | 1.14.0 |
Related Weaknesses (CWE)
References
- https://github.com/kubernetes/kubernetes/issues/97076ExploitThird Party Advisory
- https://groups.google.com/g/kubernetes-security-announce/c/iZWsF9nbKE8Mailing ListThird Party Advisory
- https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540
- https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25
- https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8
- https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc
- https://www.oracle.com//security-alerts/cpujul2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2022.htmlPatchThird Party Advisory
- https://github.com/kubernetes/kubernetes/issues/97076ExploitThird Party Advisory
- https://groups.google.com/g/kubernetes-security-announce/c/iZWsF9nbKE8Mailing ListThird Party Advisory
- https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540
- https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25
- https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8
- https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc
FAQ
What is CVE-2020-8554?
CVE-2020-8554 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker...
How severe is CVE-2020-8554?
CVE-2020-8554 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8554?
Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Kubernetes, Oracle Communications Cloud Native Core Network Slice Selection Function, Oracle Communications Cloud Native Core Policy, Oracle Communications Cloud Native Core Service Communication Proxy.