Cloud Foundry Logo

CVE-2019-3779: Cloud Foundry Container Runtime allows a user to bypass security policy when talking to ETCD

By: | February 14, 2019

Share

CVE-2019-3779: Cloud Foundry Container Runtime allows a user to bypass security policy when talking to ETCD

Severity

High

Vendor

Cloud Foundry Foundation

Affected Cloud Foundry Products and Versions

  • Cloud Foundry Container Runtime (CFCR)
    • All versions prior to v0.29.0

Description

Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • Cloud Foundry Container Runtime (CFCR)
    • Upgrade All versions to v0.29.0 or greater

History

2019-02-14: Initial vulnerability report published.

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES