Article Details

Scrape Timestamp (UTC): 2024-10-16 22:03:38.182

Source: https://www.theregister.com/2024/10/16/critical_kubernetes_image_builder_bug/

Original Article Text

Click to Toggle View

Critical default credential bug in Kubernetes Image Builder allows SSH root access. It's called leaving the door wide open - especially in Proxmox. A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) due to default credentials being enabled during the image build process. Image Builder is a tool used to build Kubernetes VMs images across multiple infrastructure providers – and images it creates include default credentials which can be used to gain root access to VMs. The vulnerability means VM images built with the Promox provider are most at risk. This flaw is tracked as CVE-2024-9486, it earned a 9.8 out of 10 CVSS severity rating, and it affects VM images built with the Proxmox provider on Image Builder version 0.1.37 or earlier. The issue also affects images built with Nutanix, OVA, QEMU or raw providers, but in these instances is rated 6.3 on the ten-point CVSS rating scale under a separate CVE tracker: CVE-2024-9594. This bug can still be abused to gain root access. However, Nutanix, OVA, and QEMU disable the default credentials at the end of the image build process. This gives an attacker a much smaller window during which to exploit CVE-2024-9594: it can only happen during the build process. Successful exploitation of CVE-2024-9594 would require the attacker "to reach the VM where the image build was happening and use the vulnerability to modify the image at the time the image build was occurring," Red Hat's Joel Smith explained. To fix the flaw: Upgrade to Image Builder v0.1.38 or later. This version sets a randomly generated password for the duration of the image build, and then disables the builder account at the end of the build process. After upgrading to a fixed version of Image Builder, users should re-deploy the new images to any affected VMs. Or, prior to upgrading and as a temporary workaround: users can mitigate the flaw by disabling the builder account. Rybnikar Enterprises' Nicolai Rybnikar found and reported the bug.

Daily Brief Summary

MALWARE // Critical SSH Access Vulnerability in Kubernetes Image Builder

A critical vulnerability in Kubernetes Image Builder could allow unauthorized root access via SSH due to default credentials left during the image build process.

The most affected provider is Proxmox, where VM images carry a high-risk CVSS score of 9.8, tracked as CVE-2024-9486.

Other affected providers include Nutanix, OVA, QEMU, and raw, each with a lower risk score of 6.3 under CVE-2024-9594, where exploitation is only possible during the image build.

The flaw impacts Image Builder version 0.1.37 or earlier; upgrading to version 0.1.38 or later, which disables the builder account post-build and uses random passwords during the build, resolves the issue.

Users are advised to upgrade and redeploy new images to any affected VMs to mitigate risks effectively.

As a temporary workaround, users can manually disable the builder account to decrease vulnerability.

The bug was discovered and reported by Nicolai Rybnikar from Rybnikar Enterprises.