MEDIUM · 4.2

CVE-2022-0532

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is a...

Vulnerability Description

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

CVSS Score

4.2

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
LOW

Affected Products

VendorProductVersions
KubernetesCri-O<= 1.18
RedhatOpenshift Container Platform4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-0532?

CVE-2022-0532 is a vulnerability with a CVSS score of 4.2 (MEDIUM). An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is a...

How severe is CVE-2022-0532?

CVE-2022-0532 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-0532?

Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Cri-O, Redhat Openshift Container Platform.