Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

Understanding and mitigating CVE-2020-8563: vSphere credentials leak in the cloud-controller-manager log

Blog post from Sysdig

Post Details
Company
Date Published
Author
Kaizhe Huang
Word Count
1,748
Language
English
Hacker News Points
-
Summary

The blog post by Kaizhe Huang discusses a security vulnerability identified as CVE-2020-8563, which affects Kubernetes clusters configured on vSphere with a logging level set to 4 or above. This vulnerability results in the leakage of vSphere credentials in the cloud-controller-manager's logs, potentially allowing unauthorized access to the infrastructure. The issue arises from the legacy cloud providers in Kubernetes, where the credentials are logged when cloud-controller-manager starts. The article explains the code paths leading to the vulnerability and emphasizes the importance of updating vSphere passwords and checking for verbose logging to mitigate the risk. It highlights that the weakness is medium severity according to the CVSS system but could escalate to high severity if log verbosity is increased for troubleshooting. Additionally, the article suggests using tools like Falco to detect if a system is impacted and underscores the need for comprehensive security measures across all Kubernetes components.