CVE-2022-0567

9.1 CRITICAL

📋 TL;DR

This vulnerability in ovn-kubernetes allows administrators or privileged attackers to create egress network policies that bypass existing ingress policies, potentially exposing pods that should be isolated. This can lead to information disclosure and unauthorized access to sensitive pod data. The issue affects Kubernetes clusters using ovn-kubernetes for network policy enforcement.

💻 Affected Systems

Products:
  • ovn-kubernetes
Versions: Versions prior to the fix
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Kubernetes clusters using ovn-kubernetes as the CNI plugin with network policies enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete cluster compromise through lateral movement, data exfiltration from all pods, and privilege escalation across the entire Kubernetes environment.

🟠

Likely Case

Targeted information disclosure from specific pods, unauthorized access to internal services, and potential data leakage from applications running in vulnerable pods.

🟢

If Mitigated

Limited impact due to network segmentation, pod security policies, and monitoring that detects unusual egress policy creation.

🌐 Internet-Facing: MEDIUM - While the exploit requires privileged access, exposed management interfaces could provide entry points for attackers to gain the necessary privileges.
🏢 Internal Only: HIGH - The vulnerability is most dangerous from within the cluster where administrators or compromised accounts can create malicious network policies.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative or privileged access to create network policies, making it more of a privilege escalation/abuse issue than a remote code execution vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat Bugzilla 2053326 for specific fixed versions

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2053326

Restart Required: Yes

Instructions:

1. Update ovn-kubernetes to the patched version. 2. Restart ovn-kubernetes components. 3. Verify network policies are functioning correctly.

🔧 Temporary Workarounds

Restrict Network Policy Creation

linux

Implement RBAC controls to limit who can create or modify NetworkPolicy resources

kubectl apply -f network-policy-rbac.yaml

Audit Existing Egress Policies

linux

Review and validate all existing egress network policies for potential bypass configurations

kubectl get networkpolicies --all-namespaces -o yaml | grep -A5 -B5 egress

🧯 If You Can't Patch

  • Implement strict RBAC controls to limit NetworkPolicy creation to trusted administrators only
  • Enable comprehensive auditing of all NetworkPolicy changes and monitor for suspicious egress policy creation

🔍 How to Verify

Check if Vulnerable:

Check ovn-kubernetes version and compare against patched versions in Red Hat advisory

Check Version:

kubectl get pods -n ovn-kubernetes -o jsonpath='{.items[*].spec.containers[*].image}' | grep ovn-kubernetes

Verify Fix Applied:

Test that egress policies no longer bypass ingress policies by creating test policies and verifying isolation

📡 Detection & Monitoring

Log Indicators:

  • Unusual NetworkPolicy creation events
  • Administrative users creating multiple egress policies
  • Failed pod isolation attempts

Network Indicators:

  • Unexpected network traffic between pods that should be isolated
  • Pods communicating on unexpected ports

SIEM Query:

event.category:kubernetes AND kubernetes.object:NetworkPolicy AND kubernetes.verb:create

🔗 References

📤 Share & Export