Use of host network containers

PLATFORM

SERVICE

kubernetes

DATA BREACHES

unknown

LAST UPDATED

EXPLOITABILITY Exploitability of a vulnerability measures how easy it is for an attacker to discover and exploit the vulnerability, some might refer to this as likelihood.

IMPACT How impactful to your environment and organization a successful exploitation of this vulnerability is expected to be.

medium

medium

About

Containers which use host networking bypass controls such as Kubernetes network policy potentially allowing unauthorized access to systems inside or outside of the cluster.

Understanding Impact

Business Impact

Host network containers can allow for unauthorized connections to other applications and servers.

Technical Impact

Host networking bypasses any controls at the Kubernetes level on traffic to and from the container. It means users with access to that container can contact services on the localhost interface of the node and also access cloud metadata services.

Identify affected resources

Review the output of kubectl get pods --all-namespaces -o json | jq -r '.items[] | select(.spec.hostNetwork==true) | .metadata.name'

Remediate vulnerable resources

Review the list of pods which have this access and, where possible, remove it. Some workloads such as kube-proxy and CNI tools like Calico and Cilium do require host networking to operate.

Did you find this article helpful?