Company
Date Published
Author
CrowdStrike
Word count
2984
Language
English
Hacker News points
None

Summary

CrowdStrike's Cloud Threat Research team discovered a critical vulnerability, dubbed "cr8escape" and tracked as CVE-2022-0811, in the CRI-O container runtime engine used by Kubernetes. This vulnerability allows an attacker to escape from a Kubernetes container, gain root access to the host, and execute arbitrary code across the cluster, posing a significant threat due to the widespread use of CRI-O. CrowdStrike disclosed this vulnerability to Kubernetes, which issued a patch, and recommends that all CRI-O users update immediately to mitigate the risk of exploitation. The detection and prevention of attempted exploits are facilitated by CrowdStrike’s Falcon sensor for Linux and the Falcon Cloud Security module. The vulnerability underscores the importance of maintaining up-to-date security measures in cloud environments to prevent potential breaches and data compromises.