CVE-2023-33190

9.9 CRITICAL

📋 TL;DR

CVE-2023-33190 is a critical RBAC misconfiguration vulnerability in Sealos that allows attackers to gain full cluster control permissions. This enables complete compromise of Kubernetes clusters deployed with Sealos, including control over all pods and resources. All Sealos users running versions before 4.2.1-rc4 are affected.

💻 Affected Systems

Products:
  • Sealos
Versions: All versions prior to 4.2.1-rc4
Operating Systems: Linux (primary), Any OS running Sealos
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Sealos deployments with default RBAC configurations. The vulnerability is in the core RBAC permission settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete cluster takeover allowing attacker to deploy malicious containers, exfiltrate sensitive data, disrupt all services, and establish persistent backdoors across the entire infrastructure.

🟠

Likely Case

Unauthorized access leading to data theft, service disruption, and potential lateral movement to other systems connected to the cluster.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent initial access, but still critical if exploited.

🌐 Internet-Facing: HIGH - If Sealos management interfaces are exposed to the internet, attackers can directly exploit this vulnerability.
🏢 Internal Only: HIGH - Even internally, any compromised user account or malicious insider could exploit this to gain full cluster control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the cluster but the actual privilege escalation is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.1-rc4 and later

Vendor Advisory: https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62

Restart Required: Yes

Instructions:

1. Backup your cluster configuration and data. 2. Update Sealos to version 4.2.1-rc4 or later using: sealos upgrade --version 4.2.1-rc4. 3. Restart the Sealos control plane components. 4. Verify RBAC permissions are properly configured.

🔧 Temporary Workarounds

No official workarounds

all

The vendor states there are no known workarounds for this vulnerability. Immediate patching is required.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Sealos management interfaces from untrusted networks
  • Enable detailed audit logging for all RBAC permission changes and cluster administrative actions

🔍 How to Verify

Check if Vulnerable:

Check Sealos version with: sealos version. If version is earlier than 4.2.1-rc4, you are vulnerable.

Check Version:

sealos version

Verify Fix Applied:

After upgrade, verify version is 4.2.1-rc4 or later with: sealos version. Then test RBAC permissions by attempting unauthorized cluster operations that should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected RBAC permission grants
  • Unauthorized cluster-admin role assignments
  • Suspicious kubectl commands from unexpected users

Network Indicators:

  • Unusual API server requests for cluster-wide permissions
  • Suspicious connections to Kubernetes API from unauthorized sources

SIEM Query:

source="kubernetes-audit" AND (verb="create" OR verb="update") AND objectRef.resource="clusterrolebindings" OR objectRef.resource="rolebindings"

🔗 References

📤 Share & Export