CVE-2024-53350

7.4 HIGH

📋 TL;DR

Insecure permissions in kubeslice v1.3.1 allow attackers to access service account tokens, enabling privilege escalation within Kubernetes clusters. This affects organizations using kubeslice for multi-cluster networking with the vulnerable version.

💻 Affected Systems

Products:
  • kubeslice
Versions: v1.3.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects kubeslice installations with default permissions; requires attacker access to the cluster.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain cluster-admin privileges, compromising all workloads, stealing sensitive data, and deploying malicious containers across connected clusters.

🟠

Likely Case

Attackers escalate privileges to access sensitive workloads, exfiltrate data, and potentially move laterally across connected Kubernetes clusters.

🟢

If Mitigated

Limited impact with proper network segmentation, RBAC restrictions, and service account token rotation policies in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires initial access to Kubernetes cluster; exploitation involves accessing improperly secured service account tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.3.2 or later

Vendor Advisory: https://github.com/kubeslice/kubeslice/security/advisories

Restart Required: No

Instructions:

1. Update kubeslice to v1.3.2 or later using helm upgrade. 2. Verify all kubeslice components are running the patched version.

🔧 Temporary Workarounds

Restrict Service Account Token Access

all

Manually adjust RBAC permissions to limit access to service account tokens

kubectl edit clusterrole kubeslice-controller
kubectl edit clusterrole kubeslice-worker

🧯 If You Can't Patch

  • Implement strict network policies to isolate kubeslice components
  • Regularly rotate service account tokens and audit RBAC permissions

🔍 How to Verify

Check if Vulnerable:

Check kubeslice version: kubectl get pods -n kubeslice-system -o jsonpath='{.items[*].spec.containers[*].image}' | grep -o 'kubeslice:[0-9.]*'

Check Version:

kubectl get pods -n kubeslice-system -o jsonpath='{.items[*].spec.containers[*].image}'

Verify Fix Applied:

Confirm all kubeslice pods show version 1.3.2 or higher in their image tags

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to service account token endpoints
  • Unusual service account token usage patterns

Network Indicators:

  • Unexpected API calls to Kubernetes token endpoints from unauthorized sources

SIEM Query:

source="kubernetes" AND ("serviceaccount/token" OR "secrets") AND action="get" AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export