A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-3024 Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation
Github GHSA Github GHSA GHSA-r6cc-7wj7-gfx2 Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Description A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.

cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published:

Updated: 2025-02-13T17:02:36.473Z

Reserved: 2023-07-24T20:24:06.695Z

Link: CVE-2023-3893

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-11-03T18:15:08.623

Modified: 2025-08-01T02:05:13.880

Link: CVE-2023-3893

cve-icon Redhat

Severity : Important

Publid Date: 2023-08-23T13:00:00Z

Links: CVE-2023-3893 - Bugzilla

cve-icon OpenCVE Enrichment

No data.