CVE-2023-3676

Source
https://cve.org/CVERecord?id=CVE-2023-3676
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3676.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-3676
Aliases
Downstream
Related
Published
2023-10-31T20:22:53.620Z
Modified
2026-05-01T04:20:03.740555Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Kubernetes - Windows nodes - Insufficient input sanitization leads to privilege escalation
Details

A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.

Database specific
{
    "cwe_ids": [
        "CWE-20"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/3xxx/CVE-2023-3676.json",
    "cna_assigner": "kubernetes"
}
References

Affected packages

Git / github.com/kubernetes/kubernetes

Affected ranges

Type
GIT
Repo
https://github.com/kubernetes/kubernetes
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3676.json"