
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2024-9594) was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The vulnerability has been rated as Medium with a CVSS score of 6.3 (Kubernetes Discuss, NVD).
The vulnerability stems from the use of default credentials during the image build process. The credentials can be used to gain root access, though they are disabled at the conclusion of the image build process. The issue has been assigned a CVSS score of 6.3 (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H), indicating medium severity (Hacker News, Security Online).
The vulnerability affects Kubernetes clusters only if their nodes use VM images created via the Image Builder project. Images are vulnerable during the build process and are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring (Kubernetes Issues).
The vulnerability has been fixed in Kubernetes Image Builder version v0.1.38. Users are advised to rebuild any affected images using the fixed version and redeploy them to affected VMs. The fix implements a randomly-generated password for the duration of the image build (Image Builder PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."