AWS has patched a rather embarrassing Kubernetes bug

Amazon Web Services (AWS) has patched a rather embarrassing bug that could allow threat actors to gain elevated privileges on a Kubernetes cluster.
The bug was found in the IAM Authenticator for Kubernetes, a plugin tool used by Amazon EKS – a managed container service to run and scale Kubernetes applications.
Detailing its findings in a security advisory, AWS explained that the bug manifested when the authenticator plugin gets configured to use the AccessKeyID template parameter. In all other scenarios, users were not in harm’s way.
Duplicate parameter names
The flaw was first discovered by Lightspin’s Director of Security Research Gafnit Amiga. In a blog post (opens in new tab), she noted: “I found several flaws in the authentication process that could bypass the protection against replay attacks or allow an attacker to gain higher permissions in the cluster by impersonating other identities.”
The flaw is tracked as CVE-2022-2385, Amiga further says, explaining that the code should check the capitalization of the parameter, but it doesn’t, and that leads to the bug. Threat actors can create duplicate parameter names, and use them to gain elevated privileges.
Execution is easier said than done, though. “Because the for loop is not ordered, the parameters are not always overridden in the order we want, therefore we might need to send the request with the malicious token to the AWS IAM Authenticator server multiple times,” Amiga concluded.
All existing EKS clusters were patched late last month, while the new IAM Authenticator for the Kubernetes version is no longer vulnerable, requiring no further action from the users. Still, those that host and manage their own Kubernetes clusters and use the IAM Authenticator’s AccessKeyID template parameter, should make sure the plugin is updated to 0.5.9.
The bug was first introduced in late 2017, but it wasn’t until September 2020 that it was exploitable, she concluded.
Via: The Register (opens in new tab)
Audio player loading… Amazon Web Services (AWS) has patched a rather embarrassing bug that could allow threat actors to gain elevated privileges on a Kubernetes cluster. The bug was found in the IAM Authenticator for Kubernetes, a plugin tool used by Amazon EKS – a managed container service to run…
Recent Posts
- The Nintendo Switch OLED is $100 off during Prime Day
- Samsung Galaxy Unpacked 2025 live: all of the last-minute Z Fold 7, Z Flip 7 and Galaxy Watch 8 rumors
- Amazon Prime Day 2025 LIVE: We’re Tracking Deals & Trends Today
- Thread count: Ikea is stitching together a smarter home
- Is a Software-Defined Perimeter (SDP) better than a VPN?
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022