Description
A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3024 | Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation |
Github GHSA |
GHSA-r6cc-7wj7-gfx2 | Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation |
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. | A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. |
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2025-02-13T17:02:36.473Z
Reserved: 2023-07-24T20:24:06.695Z
Link: CVE-2023-3893
No data.
Status : Analyzed
Published: 2023-11-03T18:15:08.623
Modified: 2025-08-01T02:05:13.880
Link: CVE-2023-3893
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA