CVE-2019-3779: Cloud Foundry Container Runtime allows a user to bypass security policy when talking to ETCD
Severity
High
Vendor
Cloud Foundry Foundation
Affected Cloud Foundry Products and Versions
- Cloud Foundry Container Runtime (CFCR)
- All versions prior to v0.29.0
Description
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
Mitigation
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
- Cloud Foundry Container Runtime (CFCR)
- Upgrade All versions to v0.29.0 or greater
History
2019-02-14: Initial vulnerability report published.