
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in CRI-O (CVE-2024-8676) where checkpoint restore functionality can be exploited. The vulnerability allows a malicious user to bypass mount access validations by tricking CRI-O into restoring a pod that doesn't have proper host mount permissions. The issue was disclosed in November 2024 and affects CRI-O container runtime (NVD).
The vulnerability exists in CRI-O's checkpoint and restore functionality. When restoring a container, CRI-O attempts to restore mounts from the restore archive instead of the pod request. This bypasses the normal validation checks that verify pod mount access permissions. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.4 HIGH (Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) (Red Hat).
If exploited, this vulnerability allows an attacker to bypass mount access controls and potentially gain unauthorized access to host mounts. The attacker needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore process (NVD).
Red Hat has released security updates to address this vulnerability in OpenShift Container Platform versions 4.17 and 4.18. Users are advised to upgrade to the patched versions when available in their appropriate release channels (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."