Vulnerability Details : CVE-2022-1706
A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.
Products affected by CVE-2022-1706
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ignition:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-1706
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-1706
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2022-1706
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2022-1706
-
https://bugzilla.redhat.com/show_bug.cgi?id=2082274
2082274 – (CVE-2022-1706) CVE-2022-1706 ignition: configs are accessible from unprivileged containers in VMs running on VMware productsIssue Tracking;Vendor Advisory
-
https://github.com/coreos/ignition/issues/1300
Security when using vmware to store the ignition config? · Issue #1300 · coreos/ignition · GitHubThird Party Advisory
-
https://github.com/coreos/ignition/commit/4b70b44b430ecf8377a276e89b5acd3a6957d4ea
Merge pull request #1350 from bgilbert/userdata · coreos/ignition@4b70b44 · GitHubPatch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5QQXRGQKTN4YX2ZF3GQNEBDEOKJGCN3/
[SECURITY] Fedora 36 Update: ignition-2.14.0-1.fc36 - package-announce - Fedora Mailing-ListsMailing List;Patch;Third Party Advisory
-
https://github.com/coreos/ignition/pull/1350
Delete userdata from VirtualBox/VMware after Ignition completes by bgilbert · Pull Request #1350 · coreos/ignition · GitHubThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NP765L7TJI7CD4XVOHUWZVRYRH3FYBOR/
[SECURITY] Fedora 35 Update: ignition-2.14.0-1.fc35 - package-announce - Fedora Mailing-ListsMailing List;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LY7LKGMQMXV6DGD263YQHNSLOJJ5VLV5/
[SECURITY] Fedora 34 Update: ignition-2.14.0-1.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://github.com/coreos/ignition/issues/1315
Consider deleting userdata from provider after Ignition completes · Issue #1315 · coreos/ignition · GitHubThird Party Advisory
Jump to