Vulnerability Details : CVE-2019-15789
Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3.
Vulnerability category: Gain privilege
Products affected by CVE-2019-15789
- cpe:2.3:a:canonical:microk8s:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-15789
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-15789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
Canonical Ltd. |
CWE ids for CVE-2019-15789
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: security@ubuntu.com (Secondary)
References for CVE-2019-15789
-
https://pulsesecurity.co.nz/advisories/microk8s-privilege-escalation
MicroK8s - Privilege Escalation (CVE-2019-15789)Exploit;Third Party Advisory
-
https://discuss.kubernetes.io/t/explicit-use-of-sudo-in-microk8s-cli/7605
Explicit use of sudo in MicroK8s CLI - Announcements - Discuss KubernetesThird Party Advisory
-
https://github.com/ubuntu/microk8s/pull/590
Harden MicroK8s by ktsakalozos · Pull Request #590 · ubuntu/microk8s · GitHubThird Party Advisory
-
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15789.html
CVE-2019-15789 in UbuntuVendor Advisory
Jump to