All Products
Search
Document Center

Container Service for Kubernetes:Vulnerability CVE-2024-5321

Last Updated:Jul 29, 2024

The Kubernetes community recently discovered vulnerability CVE-2024-5321 related to Windows nodes. In the Container Service for Kubernetes (ACK) cluster with Windows nodes, the Windows built-in security group BUILTIN\Users may read container logs on the nodes, and the security group NT AUTHORITY\Authenticated Users may have permission to modify container logs on the nodes, leading to system security risks.

This vulnerability is rated as medium severity and its Common Vulnerability Scoring System (CVSS) score is 6.1. For more information about this vulnerability, see #126161.

Affected versions

The following community versions are affected by this vulnerability:

  • kubelet ≤ 1.27.15

  • kubelet ≤ 1.28.11

  • kubelet ≤ 1.29.6

  • kubelet ≤ 1.30.2

This vulnerability only affects clusters that contain Windows nodes. You can run the following command to check if there are Windows nodes in the cluster:

 kubectl get nodes -l kubernetes.io/os=windows

Solution

If there are Windows nodes in your cluster, we recommend that you pay attention to the relevant announcements and upgrade the kubelet on nodes to fix the vulnerability. You can upgrade the kubelet by upgrading the node pool. For more information, see Update a node pool.