Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7ddh-ksnz-nbhj
Summary
Kubernetes privilege escalation vulnerability
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
Aliases
0
alias CVE-2023-3955
1
alias GHSA-q78c-gwqw-jcmc
Fixed_packages
0
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
4
url pkg:golang/k8s.io/kubernetes@1.24.17
purl pkg:golang/k8s.io/kubernetes@1.24.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.24.17
5
url pkg:golang/k8s.io/kubernetes@1.25.13
purl pkg:golang/k8s.io/kubernetes@1.25.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.25.13
6
url pkg:golang/k8s.io/kubernetes@1.26.8
purl pkg:golang/k8s.io/kubernetes@1.26.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.26.8
7
url pkg:golang/k8s.io/kubernetes@1.27.5
purl pkg:golang/k8s.io/kubernetes@1.27.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.27.5
8
url pkg:golang/k8s.io/kubernetes@1.28.1
purl pkg:golang/k8s.io/kubernetes@1.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.28.1
Affected_packages
0
url pkg:golang/k8s.io/kubernetes@1.28.0
purl pkg:golang/k8s.io/kubernetes@1.28.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3rmn-ytr3-6yet
1
vulnerability VCID-7ddh-ksnz-nbhj
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.28.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3955.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3955
reference_id
reference_type
scores
0
value 0.00762
scoring_system epss
scoring_elements 0.73446
published_at 2026-04-24T12:55:00Z
1
value 0.00762
scoring_system epss
scoring_elements 0.73413
published_at 2026-04-21T12:55:00Z
2
value 0.00762
scoring_system epss
scoring_elements 0.73419
published_at 2026-04-18T12:55:00Z
3
value 0.00762
scoring_system epss
scoring_elements 0.73411
published_at 2026-04-16T12:55:00Z
4
value 0.00762
scoring_system epss
scoring_elements 0.73369
published_at 2026-04-13T12:55:00Z
5
value 0.00762
scoring_system epss
scoring_elements 0.73377
published_at 2026-04-12T12:55:00Z
6
value 0.00762
scoring_system epss
scoring_elements 0.73373
published_at 2026-04-09T12:55:00Z
7
value 0.00762
scoring_system epss
scoring_elements 0.7336
published_at 2026-04-08T12:55:00Z
8
value 0.00762
scoring_system epss
scoring_elements 0.73323
published_at 2026-04-07T12:55:00Z
9
value 0.00762
scoring_system epss
scoring_elements 0.73351
published_at 2026-04-04T12:55:00Z
10
value 0.00762
scoring_system epss
scoring_elements 0.73327
published_at 2026-04-02T12:55:00Z
11
value 0.00762
scoring_system epss
scoring_elements 0.73397
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955
3
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
4
reference_url https://github.com/kubernetes/kubernetes/commit/38c97fa67ed35f36e730856728c9e3807f63546a
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/38c97fa67ed35f36e730856728c9e3807f63546a
5
reference_url https://github.com/kubernetes/kubernetes/commit/50334505cd27cbe7cf71865388f25a00e29b2596
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/50334505cd27cbe7cf71865388f25a00e29b2596
6
reference_url https://github.com/kubernetes/kubernetes/commit/7da6d72c05dffb3b87e62e2bc8c3228ea12ba1b9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/7da6d72c05dffb3b87e62e2bc8c3228ea12ba1b9
7
reference_url https://github.com/kubernetes/kubernetes/commit/b7547e28f898af37aa2f1107a49111f963250fe6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/b7547e28f898af37aa2f1107a49111f963250fe6
8
reference_url https://github.com/kubernetes/kubernetes/commit/c4e17abb04728e3a3f9bb26e727b0f978df20ec9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/c4e17abb04728e3a3f9bb26e727b0f978df20ec9
9
reference_url https://github.com/kubernetes/kubernetes/issues/119595
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:32Z/
url https://github.com/kubernetes/kubernetes/issues/119595
10
reference_url https://github.com/kubernetes/kubernetes/pull/120128
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120128
11
reference_url https://github.com/kubernetes/kubernetes/pull/120134
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120134
12
reference_url https://github.com/kubernetes/kubernetes/pull/120135
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120135
13
reference_url https://github.com/kubernetes/kubernetes/pull/120136
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120136
14
reference_url https://github.com/kubernetes/kubernetes/pull/120137
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120137
15
reference_url https://github.com/kubernetes/kubernetes/pull/120138
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/120138
16
reference_url https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:32Z/
url https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-3955
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-3955
18
reference_url https://security.netapp.com/advisory/ntap-20231221-0002
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231221-0002
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2227128
reference_id 2227128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2227128
20
reference_url https://security.netapp.com/advisory/ntap-20231221-0002/
reference_id ntap-20231221-0002
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:32Z/
url https://security.netapp.com/advisory/ntap-20231221-0002/
21
reference_url https://access.redhat.com/errata/RHSA-2023:4777
reference_id RHSA-2023:4777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4777
22
reference_url https://access.redhat.com/errata/RHSA-2023:4780
reference_id RHSA-2023:4780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4780
23
reference_url https://access.redhat.com/errata/RHSA-2023:4835
reference_id RHSA-2023:4835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4835
24
reference_url https://access.redhat.com/errata/RHSA-2023:4885
reference_id RHSA-2023:4885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4885
25
reference_url https://access.redhat.com/errata/RHSA-2023:7515
reference_id RHSA-2023:7515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7515
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 269
name Improper Privilege Management
description The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7ddh-ksnz-nbhj