CVE-2020-8564

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

References

https://github.com/kubernetes/kubernetes/issues/95622

https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ

https://security.netapp.com/advisory/ntap-20210122-0006/

Details

Source: MITRE

Published: 2020-12-07

Updated: 2021-03-29

Type: CWE-532

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
152832RHEL 7 : OpenShift Container Platform 3.11.z (RHSA-2021:3193)NessusRed Hat Local Security Checks
medium
147948Photon OS 2.0: Kubernetes PHSA-2021-2.0-0326NessusPhotonOS Local Security Checks
medium
146776Photon OS 3.0: Kubernetes PHSA-2021-3.0-0196NessusPhotonOS Local Security Checks
medium
145406RHEL 7 / 8 : OpenShift Container Platform 4.6.13 packages and (RHSA-2021:0172)NessusRed Hat Local Security Checks
medium
142002RHEL 7 / 8 : OpenShift Container Platform 4.6.1 package (RHSA-2020:4297)NessusRed Hat Local Security Checks
critical