Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. kubevirt.io/kubevirt
  4. ›
  5. CVE-2020-14316

CVE-2020-14316: Privilege Escalation in kubevirt

April 24, 2024

A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host’s filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

References

  • bugzilla.redhat.com/show_bug.cgi?id=1848951
  • github.com/advisories/GHSA-828r-r2c8-rfw3
  • github.com/kubevirt/kubevirt
  • github.com/kubevirt/kubevirt/pull/3686
  • nvd.nist.gov/vuln/detail/CVE-2020-14316

Code Behaviors & Features

Detect and mitigate CVE-2020-14316 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.30.0

Fixed versions

  • 0.30.0

Solution

Upgrade to version 0.30.0 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-269: Improper Privilege Management

Source file

go/kubevirt.io/kubevirt/CVE-2020-14316.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:04 +0000.