Vulnerability Details : CVE-2021-20182
A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Vulnerability category: Gain privilege
Products affected by CVE-2021-20182
- cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-20182
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-20182
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-20182
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: secalert@redhat.com (Primary)
References for CVE-2021-20182
-
https://bugzilla.redhat.com/show_bug.cgi?id=1915110
1915110 – (CVE-2021-20182) CVE-2021-20182 openshift: builder allows read and write of block devicesIssue Tracking;Mitigation;Patch;Vendor Advisory
Jump to