Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

How to mitigate kubelet's CVE-2021-25741: Symlink exchange can allow host filesystem access

Blog post from Sysdig

Post Details
Company
Date Published
Author
Alberto Pellitteri
Word Count
1,945
Language
English
Hacker News Points
-
Summary

CVE-2021-25741 is a high-severity vulnerability in Kubernetes, specifically affecting kubelet, the node agent, allowing attackers to exploit symlink exchanges in subpath volume mounts to access host filesystems. Discovered in September 2021, it impacts Kubernetes versions v1.22.0-v1.22.1, v1.21.0-v1.21.4, v1.20.0-v1.20.10, and v1.19.14, posing risks like data exfiltration and system compromise. Though no public exploit exists yet, the ease of exploitation and potential for significant damage make it critical for affected users to update to fixed versions, which include v1.22.2, v1.21.5, v1.20.11, and v1.19.15. Mitigation strategies involve disabling the Volume Subpath feature or using OPA as an admission controller to enforce policy restrictions, while detection of post-exploitation activities can be enhanced through Falco, an open-source tool for monitoring and alerting on suspicious behaviors.