CVE-2019-3779: Pivotal Container Service allows a user to bypass security policy when talking to ETCD
Severity
High
Vendor
Pivotal
Description
Pivotal Container Service versions 1.2.x prior to 1.2.9 and 1.3.x prior to 1.3.2, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
Affected VMware Products and Versions
Severity is high unless otherwise noted.
- Pivotal Container Service (PKS)
- 1.2.x versions prior to 1.2.9
- 1.3.x versions prior to 1.3.2
Mitigation
Users of affected versions should apply the following mitigation:
- Releases that have fixed this issue include:
- Pivotal Container Service (PKS) 1.2.9, 1.3.2
- There is a resource for the upgrade path available in our reference section.
References
- https://www.cloudfoundry.org/blog/cve-2019-3779/
- https://community.pivotal.io/s/article/pks-upgrade-approach-for-critical-cve/
History
2019-02-14: Initial vulnerability report published.