CVE-2024-21400

9.0 CRITICAL

📋 TL;DR

This vulnerability allows an attacker with local access to a Microsoft Azure Kubernetes Service (AKS) confidential container to elevate privileges and potentially gain control over the underlying host node. It affects AKS clusters using confidential containers, which provide hardware-based isolation for sensitive workloads. Attackers could compromise container isolation and access other containers or host resources.

💻 Affected Systems

Products:
  • Microsoft Azure Kubernetes Service
Versions: AKS clusters with confidential containers enabled, specific vulnerable versions not publicly detailed in advisory
Operating Systems: Linux-based container hosts
Default Config Vulnerable: ✅ No
Notes: Only affects AKS clusters using confidential containers feature; standard AKS containers are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the AKS cluster node, allowing lateral movement to other nodes, data exfiltration, and persistent backdoor installation across the Kubernetes environment.

🟠

Likely Case

Container escape leading to unauthorized access to other containers on the same node, credential theft, and potential access to sensitive data within the cluster.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal permissions, and monitoring, though container isolation would still be breached.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires initial access to a vulnerable confidential container; no public exploit code available as of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AKS platform updates automatically applied by Microsoft; check Azure portal for cluster version >= recommended patch

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400

Restart Required: Yes

Instructions:

1. Log into Azure portal. 2. Navigate to your AKS cluster. 3. Check for available upgrades under 'Settings' > 'Cluster configuration'. 4. Apply the recommended platform update. 5. Nodes will restart automatically during update.

🔧 Temporary Workarounds

Disable confidential containers

all

Temporarily disable confidential containers feature in AKS clusters if not required, reducing attack surface.

az aks update --resource-group <resource-group> --name <cluster-name> --disable-confidential-containers

🧯 If You Can't Patch

  • Implement strict network policies to limit container-to-container and container-to-host communication within the cluster.
  • Apply principle of least privilege to service accounts and pod security contexts; use Kubernetes Pod Security Standards (PSS) in restricted mode.

🔍 How to Verify

Check if Vulnerable:

Check if confidential containers are enabled in your AKS cluster via Azure portal or CLI: az aks show --resource-group <rg> --name <cluster> --query 'securityProfile.confidentialComputing'

Check Version:

az aks show --resource-group <resource-group> --name <cluster-name> --query 'kubernetesVersion'

Verify Fix Applied:

Verify cluster has been updated to latest AKS version in Azure portal under 'Properties' > 'Kubernetes version' and confirm no security alerts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in container runtime logs (e.g., Docker, containerd)
  • Suspicious process creation from containers in host audit logs
  • Kubernetes API server logs showing unauthorized pod or node access attempts

Network Indicators:

  • Anomalous outbound connections from containers to cluster nodes or external IPs
  • Unexpected network traffic between containers that should be isolated

SIEM Query:

ContainerRuntimeLogs | where ProcessName contains 'privilege' or CommandLine contains 'chroot' or 'nsenter' | where ContainerImage contains 'confidential'

🔗 References

📤 Share & Export