CVE-2019-9946
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
Overview
- CVE ID
- CVE-2019-9946
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2019-04-02T18:30:26
- Last Modified Date
- 2020-08-24T17:37:01
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:* | 1 | OR | 0.7.5 | |
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1 | OR | 1.11.9 | |
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1 | OR | 1.12.0 | 1.12.7 |
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1 | OR | 1.13.0 | 1.13.5 |
cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-9946 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9946 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:18:51 | Added to TrackCVE | |||
2022-12-03 18:56:49 | 2019-04-02T18:30Z | 2019-04-02T18:30:26 | CVE Published Date | updated |
2022-12-03 18:56:49 | 2020-08-24T17:37:01 | CVE Modified Date | updated | |
2022-12-03 18:56:49 | Modified | Vulnerability Status | updated |