pwshub.com

Mandiant uncovers critical privilege escalation vulnerability in Azure Kubernetes service

Google LLC’s Mandiant has published details of a critical privilege escalation vulnerability found in Microsoft Corp.’s Azure Kubernetes service that, though patched by Microsoft, could have allowed attackers to gain access to credentials for services used in Kubernetes clusters.

The privilege escalation vulnerability was found in Azure Kubernetes Services clusters using “Azure CNI” for the “Network configuration” and “Azure” for the “Network Policy.” An attacker with command execution in a pod running within an affected Azure Kubernetes Services cluster could download the configuration used to provision the cluster node, extract the transport layer security bootstrap tokens and perform a TLS bootstrap attack to read all secrets within the cluster.

The vulnerability is related to Azure WireServer, an undocumented component of Azure used internally by the platform for several reasons. Using previous research from CyberCX published in May 2023, Mandiant’s researchers found that the key used to encrypt protected settings values can be requested from the WireServer.

An attacker with command execution privileges of an affected AKS cluster could have then leveraged the flaw to download the configuration details for the node, including the TLS bootstrap tokens used during the initial setup of a Kubernetes node.

Given access to the WireServer and HostGAPlugin endpoint, an attacker could then retrieve and decrypt the settings provided to a number of extensions, including the “Custom Script Extension,” a service used to provide a virtual machine its initial configuration.

The issue was addressed by Microsoft prior to the details being published Monday, but the vulnerability does raise broader questions about security in both Kubernetes and Azure.

“The recent vulnerability discovered in Azure Kubernetes Services is a prime example of how complex modern cloud environments can create unexpected security risks,” Guy Rosenthal, vice president of product at security solutions provider DoControl Inc., told SiliconANGLE. “This isn’t just about a simple configuration error — it’s a sophisticated attack that exploits undocumented Azure components to gain elevated privileges within a Kubernetes cluster.”

Rosenthal explained that though Microsoft has patched this specific issue, it highlights a broader challenge in cloud security. “As we build more complex, interconnected systems, we’re also creating new attack surfaces that might not be immediately obvious,” he said. “It’s not enough to just secure the front door — we need to think about every possible entry point, even the ones we didn’t know existed.”

Callie Guenther, senior manager of cyber threat research at managed detection and response firm Critical Start Inc., said security teams must immediately audit their AKS configurations, especially if using ‘Azure CNI’ for network configuration and ‘Azure’ for network policy.

Security teams “should also rotate all Kubernetes secrets, enforce strict pod security policies and implement robust logging and monitoring to detect any suspicious activities,”  Guenther added. “While this vulnerability is serious, requiring prompt action, it is a second-stage attack, meaning it needs prior access to a pod. Thus, it should be prioritized accordingly within the broader context of an organization’s threat landscape.”

Source: siliconangle.com

Related stories
3 weeks ago - A flurry of new artificial intelligence models this week illustrated what’s coming next in AI: smaller language models targeted at vertical industries and functions. Both Nvidia and Microsoft debuted smaller large language models too....
1 month ago - Google LLC today announced several new security features and capabilities at its annual Google Cloud Security Summit that are aimed at “reimagining cybersecurity through the power of convergence.” Convergence was a key theme at the...
7 hours ago - Ransomware has quickly grown into a multi-billion-dollar industry, forcing a shift in how cybersecurity is approached, including the development of solutions such as Mandiant Threat Intelligence. In the last five years, as profits for...
3 weeks ago - Industrial cybersecurity firm Nozomi Networks Inc. today announced the general availability of the Nozomi TI Expansion Pack, a new federated solution powered by Mandiant Threat Intelligence that helps strengthen the way industrial and...
1 day ago - Google Cloud today announced several new security features and an updated framework aimed at enhancing threat detection, identification and response, along with assisting companies in sharing threat intelligence and defending their...
Other stories
32 minutes ago - Shares of Truth Social’s parent company fell Thursday, extending the latest round of declines for Trump Media & Technology Group.
1 hour ago - European Union officials are taking new steps to ensure that Apple Inc. complies with the bloc’s DMA tech industry regulation. The European Commission, the EU’s executive arm, announced the initiative today. The DMA is a piece of...
1 hour ago - Shares in automotive chip maker Mobileye Global Inc. jumped nearly 15% today after its majority shareholder, Intel Corp., said that it has no plans to divest its interest in the company. Reports earlier this month suggested that Intel...
1 hour ago - Cybersecurity risk management is becoming more critical than ever as industries adapt to an increasingly digital landscape. The rapid growth of artificial intelligence, combined with complex cyber threats, is pushing companies to rethink...
1 hour ago - Nike named a new CEO as Wall Street has questioned the company's plan to reinvigorate sales growth.