{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-5528","assignerOrgId":"a6081bf6-c852-4425-ad4f-a67919267565","state":"PUBLISHED","assignerShortName":"kubernetes","dateReserved":"2023-10-11T16:12:14.212Z","datePublished":"2023-11-14T20:32:08.411Z","dateUpdated":"2026-02-25T17:20:08.702Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"kubelet","repo":"https://github.com/kubernetes/kubernetes","vendor":"Kubernetes","versions":[{"lessThanOrEqual":"v1.28.3","status":"affected","version":"v1.28.0","versionType":"semver"},{"lessThanOrEqual":"v1.27.7","status":"affected","version":"v1.27.0","versionType":"semver"},{"lessThanOrEqual":"v1.26.10","status":"affected","version":"v1.26.0","versionType":"semver"},{"lessThanOrEqual":"v1.25.15","status":"affected","version":"0","versionType":"semver"},{"status":"unaffected","version":"v1.28.4"},{"status":"unaffected","version":"v1.27.8"},{"status":"unaffected","version":"v1.26.11"},{"status":"unaffected","version":"v1.25.16"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Tomer Peled"}],"datePublic":"2023-11-14T17:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes."}],"value":"A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6081bf6-c852-4425-ad4f-a67919267565","shortName":"kubernetes","dateUpdated":"2024-09-06T14:18:44.918Z"},"references":[{"tags":["issue-tracking"],"url":"https://github.com/kubernetes/kubernetes/issues/121879"},{"tags":["mailing-list"],"url":"https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA"}],"source":{"discovery":"EXTERNAL"},"title":"Kubernetes - Windows nodes - Insufficient input sanitization in in-tree storage plugin leads to privilege escalation","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:59:44.808Z"},"title":"CVE Program Container","references":[{"tags":["issue-tracking","x_transferred"],"url":"https://github.com/kubernetes/kubernetes/issues/121879"},{"tags":["mailing-list","x_transferred"],"url":"https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240119-0009/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-5528","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-03-16T04:00:48.890125Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-25T17:20:08.702Z"}}]}}