Vulnerability Description
An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Konveyor | Mig-Controller | < 1.5.2 |
| Redhat | Migration Toolkit | 1.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2022017Issue TrackingPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2022017Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2021-3948?
CVE-2021-3948 is a vulnerability with a CVSS score of 6.3 (MEDIUM). An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cl...
How severe is CVE-2021-3948?
CVE-2021-3948 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3948?
Check the references section above for vendor advisories and patch information. Affected products include: Konveyor Mig-Controller, Redhat Migration Toolkit, Redhat Enterprise Linux.