Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-y131-2ntq-hfdn
Summary
Ignition config accessible to unprivileged software on VMware
### Impact
Unprivileged software in VMware VMs, including software running in unprivileged containers, can retrieve an Ignition config stored in a hypervisor guestinfo variable or OVF environment.  If the Ignition config contains secrets, this can result in the compromise of sensitive information.

### Patches
Ignition 2.14.0 and later [adds](https://github.com/coreos/ignition/pull/1350) a new systemd service, `ignition-delete-config.service`, that deletes the Ignition config from supported hypervisors (currently VMware and VirtualBox) during the first boot.  This ensures that unprivileged software cannot retrieve the Ignition config from the hypervisor.

If you have external tooling that requires the Ignition config to remain accessible in VM metadata after provisioning, and your Ignition config does not include sensitive information, you can prevent Ignition 2.14.0 and later from deleting the config by masking `ignition-delete-config.service`.  For example:

```json
{
  "ignition": {
    "version": "3.0.0"
  },
  "systemd": {
    "units": [
      {
        "name": "ignition-delete-config.service",
        "mask": true
      }
    ]
  }
}
```

### Workarounds
[Avoid storing secrets](https://coreos.github.io/ignition/operator-notes/#secrets) in Ignition configs. In addition to VMware, many cloud platforms allow unprivileged software in a VM to retrieve the Ignition config from a networked cloud metadata service. While platform-specific mitigation is possible, such as firewall rules that prevent access to the metadata service, it's best to store secrets in a dedicated platform such as [Hashicorp Vault](https://www.vaultproject.io/).

### Advice to Linux distributions
Linux distributions that ship Ignition should ensure the new `ignition-delete-config.service` is installed and enabled by default.

In addition, we recommend shipping a service similar to `ignition-delete-config.service` that runs when existing machines are upgraded, similar to the one in https://github.com/coreos/fedora-coreos-config/pull/1738. Consider giving your users advance notice of this change, and providing instructions for masking `ignition-delete-config.service` on existing nodes if users have tooling that requires the Ignition config to remain accessible in VM metadata.

### References
For more information, see #1300 and #1350.

### For more information
If you have any questions or comments about this advisory, [open an issue in Ignition](https://github.com/coreos/ignition/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).
Aliases
0
alias CVE-2022-1706
1
alias GHSA-hj57-j5cw-2mwp
Fixed_packages
0
url pkg:deb/debian/ignition@2.14.0%2Bds1-1?distro=trixie
purl pkg:deb/debian/ignition@2.14.0%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ignition@2.14.0%252Bds1-1%3Fdistro=trixie
1
url pkg:golang/github.com/coreos/ignition/v2@2.14.0
purl pkg:golang/github.com/coreos/ignition/v2@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/coreos/ignition/v2@2.14.0
Affected_packages
0
url pkg:rpm/redhat/ignition@2.14.0-1?arch=el9
purl pkg:rpm/redhat/ignition@2.14.0-1?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-y131-2ntq-hfdn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-1%3Farch=el9
1
url pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11?arch=el8
purl pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4pue-fbre-zfcf
1
vulnerability VCID-7e1n-pvrt-g3fy
2
vulnerability VCID-835d-4cep-d3ff
3
vulnerability VCID-dsm8-ck8e-wfdh
4
vulnerability VCID-ps89-8u5a-kfc8
5
vulnerability VCID-y131-2ntq-hfdn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1706.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1706
reference_id
reference_type
scores
0
value 0.00592
scoring_system epss
scoring_elements 0.69315
published_at 2026-04-24T12:55:00Z
1
value 0.00592
scoring_system epss
scoring_elements 0.69189
published_at 2026-04-07T12:55:00Z
2
value 0.00592
scoring_system epss
scoring_elements 0.69239
published_at 2026-04-08T12:55:00Z
3
value 0.00592
scoring_system epss
scoring_elements 0.69258
published_at 2026-04-09T12:55:00Z
4
value 0.00592
scoring_system epss
scoring_elements 0.6928
published_at 2026-04-11T12:55:00Z
5
value 0.00592
scoring_system epss
scoring_elements 0.69265
published_at 2026-04-12T12:55:00Z
6
value 0.00592
scoring_system epss
scoring_elements 0.69237
published_at 2026-04-13T12:55:00Z
7
value 0.00592
scoring_system epss
scoring_elements 0.69276
published_at 2026-04-16T12:55:00Z
8
value 0.00592
scoring_system epss
scoring_elements 0.69284
published_at 2026-04-18T12:55:00Z
9
value 0.00592
scoring_system epss
scoring_elements 0.69264
published_at 2026-04-21T12:55:00Z
10
value 0.00592
scoring_system epss
scoring_elements 0.69172
published_at 2026-04-01T12:55:00Z
11
value 0.00592
scoring_system epss
scoring_elements 0.69187
published_at 2026-04-02T12:55:00Z
12
value 0.00592
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1706
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/coreos/ignition
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition
4
reference_url https://github.com/coreos/ignition/issues/1300
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/issues/1300
5
reference_url https://github.com/coreos/ignition/pull/1350
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/pull/1350
6
reference_url https://github.com/coreos/ignition/security/advisories/GHSA-hj57-j5cw-2mwp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/security/advisories/GHSA-hj57-j5cw-2mwp
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014716
reference_id 1014716
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014716
8
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
9
reference_url https://access.redhat.com/errata/RHSA-2022:8126
reference_id RHSA-2022:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8126
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
1
cwe_id 863
name Incorrect Authorization
description The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
2
cwe_id 921
name Storage of Sensitive Data in a Mechanism without Access Control
description The product stores sensitive information in a file system or device that does not have built-in access control.
Exploits
Severity_range_score4.0 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-y131-2ntq-hfdn