We’re taking action to secure our IBM Cloud Kubernetes Service against the recent Kubernetes security vulnerabilities.
IBM Cloud Kubernetes Service is affected by the following vulnerabilities that, in some cases, allow unauthorized access to Kubernetes and/or trusted user privilege escalation.
CVEID: CVE-2018-1002105 https://github.com/kubernetes/kubernetes/issues/71411
IBM Security Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10743917
Affected Products and Versions
Affected components: Kubernetes API server
Affected versions: Kubernetes versions 1.0.x through 1.12.x
What do I need to know?
This exposure affects your IBM Cloud Kubernetes cluster master only, there is no exposure to your IBM Cloud Kubernetes Workers.
There are two exploits as part of this vulnerability:
Vulnerability 1: Authenticated and unauthenticated requests can provide full admin access to Kubernetes API Server.
Affected users: This only affects users with aggregated API servers.
1.11 and earlier: IBM Cloud Kubernetes Service does not deploy any aggregated API servers in versions 1.11 and earlier. You will not be impacted unless you have deployed your own aggregated API server.
1.12: All users are affected since all clusters contain the metrics-server, which is an aggregated API server affected by this vulnerability.
Vulnerability 2: Authenticated users with specific permissions to exec/attach/portforward API calls can be escalated to perform any API request against the kubelet API on the node specified in the pod spec.
Affected users: All IBM Cloud Kubernetes Service clusters are affected by this vulnerability.
We have released updates for all supported releases of IBM Cloud Kubernetes Service. All supported clusters will auto-update to remediate the vulnerabilities.
How do I mitigate the issue?
If you are on a supported release, then you don’t need to do anything, your IBM Cloud Kubernetes Cluster Master will be updated automatically.
All supported IBM Cloud Kubernetes Service clusters at version 1.10 and later will be updated automatically to address this security flaw. If you find that your cluster has not been automatically updated over the next few days, please contact IBM Support.
Customers running unsupported IBM Cloud Kubernetes versions must upgrade the affected clusters to a supported version 1.10.11, 1.11.5, 1.12.3, or later when these versions are released by IBM.
Refer to https://cloud.ibm.com/docs/containers/cs_versions.html for more information about Kubernetes versions.
You do not need to update your workers for this exposure, we do recommend that you always stay current with your workers to ensure you are not vulnerable to other exposures.
How do I check my version?
To see which version your clusters are currently using:
What about unsupported clusters?
For 1.9.x or 1.8.x, you must update your cluster to a supported release:
For 1.7.x, you must first update to 1.9 and then update to a supported release:
ibmcloud ks cluster-update --cluster <clustername> --kube-version 1.9
Confirm that the update completed successfully by checking the Kubernetes version.
ibmcloud ks cluster-update --cluster <clustername> --kube-version 1.10
Questions or comments
Please join us on our public Slack channel at https://ibm-container-service.slack.com or raise a support ticket if you have any issues.