Vulnerability Description
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubernetes | Kubernetes | < 1.19.3 |
Related Weaknesses (CWE)
References
- https://github.com/kubernetes/kubernetes/issues/95621Third Party Advisory
- https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5Mailing ListPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20210122-0006/Third Party Advisory
- https://github.com/kubernetes/kubernetes/issues/95621Third Party Advisory
- https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5Mailing ListPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20210122-0006/Third Party Advisory
FAQ
What is CVE-2020-8563?
CVE-2020-8563 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3...
How severe is CVE-2020-8563?
CVE-2020-8563 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8563?
Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Kubernetes.