CVE-2021-1677: Azure Active Directory Pod Identity Spoofing Vulnerability

Overview

Severity
Medium (CVSS 5.5)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2021-Jan
Released
2021-01-12
EPSS Score
0.48% (percentile: 65.3%)

FAQ

What can an attacker do with this vulnerability? The AAD pod identity enables users to assign identities to pods in Kubernetes clusters and fetch them from the pods using a regular IMDS (Azure Instance Metadata Service) request. When an identity is assigned to a pod, the pod can access to the IMDS endpoint and get a token of that identity. An attacker who successfully exploited this vulnerability can laterally steal the identities that are associated with different pods. How do I know if I need to install the update? Customers with existing installation need to re-deploy their cluster and use Azure CNI instead of the default kubernet. For more information, please see details here: Configure Azure CNI networking in Azure Kubernetes Service (AKS) Deploy AAD Pod Identity in a Cluster with Kubenet New installations will already have the update installed.

Affected Products (1)

Azure

  • Microsoft Azure Kubernetes Service

Security Updates (1)

Revision History

  • 2021-01-12: Information published.