Understanding and mitigating CVE-2020-8563: vSphere credentials leak in the cloud-controller-manager log
Blog post from Sysdig
The blog post by Kaizhe Huang discusses a security vulnerability identified as CVE-2020-8563, which affects Kubernetes clusters configured on vSphere with a logging level set to 4 or above. This vulnerability results in the leakage of vSphere credentials in the cloud-controller-manager's logs, potentially allowing unauthorized access to the infrastructure. The issue arises from the legacy cloud providers in Kubernetes, where the credentials are logged when cloud-controller-manager starts. The article explains the code paths leading to the vulnerability and emphasizes the importance of updating vSphere passwords and checking for verbose logging to mitigate the risk. It highlights that the weakness is medium severity according to the CVSS system but could escalate to high severity if log verbosity is increased for troubleshooting. Additionally, the article suggests using tools like Falco to detect if a system is impacted and underscores the need for comprehensive security measures across all Kubernetes components.