
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A security vulnerability (CVE-2024-3177) was discovered in Kubernetes that allows users to bypass the mountable secrets policy enforced by the ServiceAccount admission plugin. The vulnerability affects containers, init containers, and ephemeral containers using the envFrom field. This issue was discovered in April 2024 and affects Kubernetes versions kube-apiserver v1.29.0-v1.29.3, v1.28.0-v1.28.8, and versions <= v1.27.12. The vulnerability has been rated as Low severity with a CVSS score of 2.7 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) (Kubernetes Issue, OSS Security).
The vulnerability exists in the ServiceAccount admission plugin's policy enforcement mechanism. The issue specifically occurs when containers use the envFrom field populated while running with a service account that has the kubernetes.io/enforce-mountable-secrets annotation. The policy is designed to ensure pods running with a service account may only reference secrets specified in the service account's secrets field, but this restriction could be bypassed through the envFrom field configuration (Kubernetes Issue).
The vulnerability allows authenticated users to access secrets that should be restricted by the ServiceAccount admission plugin's mountable secrets policy. This could lead to unauthorized access to sensitive information stored in Kubernetes secrets, though the impact is limited due to the high privileges required for exploitation (Kubernetes Issue).
The vulnerability has been patched in the following versions: kube-apiserver v1.29.4, v1.28.9, and v1.27.13. Users should upgrade to these fixed versions to mitigate the vulnerability. The patch prevents containers with envFrom field populated from bypassing the mountable secrets policy. Detection of potential exploitation can be performed using API audit logs and by identifying active pods using the kubernetes.io/enforce-mountable-secrets annotation (Kubernetes Issue, OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”