Security Bulletin
Summary
IBM Cloud Kubernetes Service is affected by a security vulnerability in Project Calico, the network CNI plugin used in IBM Cloud Kubernetes Service, which could result in weaker than expected network policy protection.
Vulnerability Details
DESCRIPTION: Project Calico could allow a remote authenticated attacker to bypass security restrictions, caused by an error in VXLAN and IPIP overlay modes when a malicious pod transmits packets to node IP addresses. An attacker could exploit this vulnerability to bypass network policies or spoof IP addresses.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/163280 for the current score
CVSS Environmental Score*: Undefined
Affected Products and Versions
IBM Cloud Kubernetes Service 1.14.0-1.14.3
IBM Cloud Kubernetes Service 1.13.0-1.13.7
IBM Cloud Kubernetes Service 1.12.0-1.12.9
IBM Cloud Kubernetes Service 1.5-1.11
Remediation/Fixes
IBM Cloud Kubernetes Service clusters at versions 1.12 and later have been updated to address this vulnerability. If your clusters are at versions 1.12, 1.13 or 1.14 there is no need to update worker nodes to address this vulnerability. However, if you are running any untrusted code in your cluster that might have been able to take advantage of this vulnerability, you should also either reload/update each of your nodes or reboot them. This will restart any pods that might have connections still open from before the update that are exploiting this vulnerability.
In some situations IBM Cloud Kubernetes Service might not have been able to update a cluster. To verify your clusters are no longer exposed use the following IBM Cloud CLI command to confirm the currently running versions:
ibmcloud ks clusters
If your versions are at one of the following levels or later, you are no longer exposed to this vulnerability:
If one or more of your clusters is at version 1.12, 1.13 or 1.14 and has not been automatically updated, then use the following IBM Cloud CLI command to complete the update, replacing "1.##" with the target version.
ibmcloud ks cluster-update --cluster <cluster name or ID> --kube-version 1.##
Customers running IBM Cloud Kubernetes Service clusters at versions 1.10 or 1.11 must upgrade their affected clusters to version 1.12. Customers running IBM Cloud Kubernetes Service clusters at version 1.9 must upgrade first to version 1.11 and then to version 1.12. Please review the documentation before starting the upgrade since additional actions may be required.
ibmcloud ks cluster-update --cluster <cluster name or ID> --kube-version 1.##
If you are running IBM Cloud Kubernetes Service clusters at version 1.5, 1.7 or 1.8 there is no migration path.
Note: IBM Cloud Kubernetes Service versions 1.5, 1.7, 1.8, 1.9, 1.10 are no longer supported, and version 1.11 is deprecated. See the IBM Cloud Kubernetes Service Version information and update actions documentation for more information about Kubernetes versions and version support policies.
Monitor IBM Cloud Status for Future Security Bulletins
Monitor the security notifications on the IBM Cloud Status page to be advised of future security bulletins.
References
Change History
18 July 2019: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
19 July 2019
UID
ibm10959551