Description

Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2.

INFO

Published Date :

2024-08-12T15:21:52.010Z

Last Modified :

2024-08-12T17:55:54.373Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-42480 vulnerability.

Vendors Products
Clastix
  • Kamaji

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact