Critical Kubernetes vulnerability allows root access

A serious security vulnerability in certain Kubernetes Image Builder versions results in VM images being generated with fixed credentials. This allows attackers, under certain circumstances, to access systems via SSH as root users. Proxmox images that are provided with static credentials are particularly affected (CVE-2024-9486). This vulnerability is rated “critical” because attackers can gain direct access. Nutanix images also have a vulnerability (CVE-2024-9594), but it is rated “moderate” because it requires manipulation in the build process.

The developers of the Kubernetes Image Builder have fixed the security issues in version 0.1.38. The updated version generates random passwords and disables the builder account, thus avoiding these vulnerabilities in new VM images. However, existing images remain vulnerable and must be completely wiped and rebuilt to ensure security.

What are Proxmox images?

Proxmox images are virtual machines (VMs) created with the Proxmox Virtual Environment (PVE) virtualization solution. PVE is an open source software for managing and deploying virtual machines and containers, often used in data centers and IT infrastructures. Proxmox supports various image types that contain operating systems, configurations, and applications. These images can be quickly converted to VMs and scaled to flexibly deploy servers and services in virtualized environments.

What are Nutanix images?

Nutanix images are virtual machines or container images created on the Nutanix platform. Nutanix provides a hyper-converged infrastructure (HCI) that combines computing power, storage and network resources in a central system. Nutanix software enables these images to be efficiently managed and deployed for cloud and on-premises environments. Nutanix images often include operating systems and specific applications and are used in virtualized environments to provide scalable and flexible IT resources.

Leave a comment