HomeKubernetesCVE-2022-0811

CVE-2022-0811

HIGH
8.8CVSS
Published: 2022-03-16
Updated: 2024-11-21
AI Analysis

Description

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-94CWE-94

Metadata

Primary Vendor
KUBERNETES
Published
3/16/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

kubernetes : cri-okubernetes : cri-okubernetes : cri-okubernetes : cri-okubernetes : cri-o

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-0811 | HIGH Severity | CVEDatabase.com | CVEDatabase.com