Summary
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy, which is a common default configuration on Windows nodes. Run kubectl get nodes -l kubernetes.io/os=windows to determine whether any Windows nodes are present in your cluster. The vulnerability is part of a class of issues requiring patches for CVE-2023-3676, CVE-2023-3955, and CVE-2023-3893 for full mitigation.
Impact
Any user with permission to create pods on Windows nodes that run kubernetes-csi-proxy can exploit insufficient input sanitization in the proxy to achieve admin-level privileges on those nodes. Because kubernetes-csi-proxy is commonly deployed as a default component on Windows nodes, a significant number of Windows-based Kubernetes deployments are affected. The high CVSS score (8.8) reflects network-accessible attack vector, low privileges required, and full confidentiality, integrity, and availability impact on affected nodes.
Detection
Kubernetes audit logs can be used to detect if this vulnerability is being exploited. Pod create events with embedded PowerShell commands are a strong indication of exploitation. If you find evidence that this vulnerability has been exploited, contact security@kubernetes.io.
Mitigation
Upgrade kubernetes-csi-proxy to a patched version on all affected Windows nodes:
- v2.0.0-alpha.1 or later (for the v2 alpha branch)
- v1.1.3 or later (for the v1 stable branch)
To upgrade: cordon the node, stop the associated Windows service, replace the csi-proxy.exe binary, restart the service, and un-cordon the node. See the kubernetes-csi-proxy installation documentation for details.
If kubernetes-csi-proxy is deployed as a Windows host process DaemonSet (for example, using a manifest similar to the one in csi-driver-smb), upgrade the image to a fixed version such as ghcr.io/kubernetes-sigs/sig-windows/csi-proxy:v1.1.3.
There are no known mitigations outside of applying the provided patches. Full mitigation for this class of issues requires applying patches for CVE-2023-3676, CVE-2023-3955, and CVE-2023-3893.