Description
A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Published: 2020-07-29
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1148 A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Github GHSA Github GHSA GHSA-828r-r2c8-rfw3 Privilege Escalation in kubevirt
History

No history.

Subscriptions

Kubevirt Kubevirt
Redhat Container Native Virtualization Openshift Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T12:39:36.221Z

Reserved: 2020-06-17T00:00:00.000Z

Link: CVE-2020-14316

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-29T19:15:14.420

Modified: 2024-11-21T05:02:59.607

Link: CVE-2020-14316

cve-icon Redhat

Severity : Important

Publid Date: 2020-06-23T00:00:00Z

Links: CVE-2020-14316 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses