Description
An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7674 | kyverno verifyImages rule bypass possible with malicious proxy/registry |
Github GHSA |
GHSA-m3cq-xcx9-3gvm | kyverno verifyImages rule bypass possible with malicious proxy/registry |
References
History
Tue, 15 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-15T03:22:55.828Z
Reserved: 2022-12-20T00:00:00.000Z
Link: CVE-2022-47633
Updated: 2024-08-03T15:02:36.144Z
Status : Modified
Published: 2022-12-23T23:15:08.973
Modified: 2025-04-15T04:15:33.853
Link: CVE-2022-47633
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA