Vulnerability Description
In vulnerable versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernetes node, can escalate their privileges by exploiting a vulnerability in the Calico CNI install binary. The issue arises from an incorrect SUID (Set User ID) bit configuration in the binary, combined with the ability to control the input binary, allowing an attacker to execute an arbitrary binary with elevated privileges.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/projectcalico/calico/issues/7981
- https://github.com/projectcalico/calico/pull/8447
- https://github.com/projectcalico/calico/pull/8517
- https://www.tigera.io/security-bulletins-tta-2024-001/
- https://github.com/projectcalico/calico/issues/7981
- https://github.com/projectcalico/calico/pull/8447
- https://github.com/projectcalico/calico/pull/8517
- https://www.tigera.io/security-bulletins-tta-2024-001/
FAQ
What is CVE-2024-33522?
CVE-2024-33522 is a vulnerability with a CVSS score of 6.7 (MEDIUM). In vulnerable versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernete...
How severe is CVE-2024-33522?
CVE-2024-33522 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-33522?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.