{"id":8635,"date":"2024-03-13T15:43:22","date_gmt":"2024-03-13T06:43:22","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8635"},"modified":"2024-11-21T15:47:58","modified_gmt":"2024-11-21T06:47:58","slug":"researchers-uncover-kubernetes-flaw-allowing-full-control-of-windows-nodes","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/researchers-uncover-kubernetes-flaw-allowing-full-control-of-windows-nodes\/","title":{"rendered":"Researchers Uncover Kubernetes Flaw allowing Full Control of Windows Nodes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8635\" class=\"elementor elementor-8635\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb6ebc1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb6ebc1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-875da44\" data-id=\"875da44\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cfd4e09 elementor-widget elementor-widget-text-editor\" data-id=\"cfd4e09\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>There is a vulnerability that allows remote code execution with SYSTEM privileges on all Windows machines within a Kubernetes cluster. Tracked as CVE-2023-5528 (CVSS score: 7.2), the shortcoming affects all versions of Kubelet, both prior to and after version 1.8.0.\u00a0A successful exploit of the vulnerability could result in the complete takeover of all Windows nodes in a cluster, and it is worth noting that the web infrastructure company previously disclosed another set of similar vulnerabilities in September 2023.<br \/><br \/>This vulnerability can only be mitigated by patching Kubernetes, and it should be noted that this vulnerability only affects Windows-based systems. It is not necessary to patch this specific vulnerability if your Kubernetes cluster does not contain any Windows nodes. However, it is important to patch it anyway when you have the opportunity and organizations using Kubernetes in Japan should be careful because successful exploitation could lead to the complete takeover of all Windows nodes within the cluster.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There is a vulnerability that allows remote code execution with SYSTEM privileges on all Windows machines within a Kubernetes cluster. Tracked as CVE-2023-5528 (CVSS score: 7.2), the shortcoming affects all versions of Kubelet, both prior to and after version 1.8.0.\u00a0A successful exploit of the vulnerability could result in the complete takeover of all Windows nodes in a cluster, and it<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,12,8,1],"tags":[],"class_list":["post-8635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_vulnerabilities","category-read_article","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2024\/03\/Pic1-2.jpg?fit=602%2C402&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8635"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8635"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8635\/revisions"}],"predecessor-version":[{"id":8641,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8635\/revisions\/8641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8642"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}