Active Kubernetes RCE Attack Relies on Known OpenMetadata Vulns

Share This Post

Known vulnerabilities in OpenMetadata’s open source metadata repository have been under active exploit since the beginning of April, allowing threat actors to launch remote code execution cyberattacks against unpatched Kubernetes clusters, according to research from Microsoft Threat Intelligence.

OpenMetadata is an open source platform that operates as a management tool as well as a central repository for metadata. In mid-March, researchers published information on five new vulnerabilities (CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254) that affected versions preceding v1.3.1, according to Microsoft’s report.

And while many cybersecurity teams might have missed the advisory, adversaries picked up on the opportunity to break into vulnerable Kubernetes environments and leverage them for cryptocurrency mining, the vendor said.

“In this case, a vulnerable Kubernetes workload which is exposed to the Internet got exploited,” Microsoft researcher Yossi Weizman explains. While the cybercriminals were engaged in crypto mining, he warns there’s a wide range of nefarious activity an adversary can engage in once they’re inside a Kubernetes cluster.

“In general (not specifically in this case), once attackers have control over a workload in the cluster, they can try to leverage this access also for lateral movement, both inside the cluster and also to external resources,” Weizman adds.

OpenMetadata administrators are advised to update, use strong authentication, and reset any default credentials in use.

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltada1952e2a0a9192/662012aff8d53d8ff8f7fa87/cloud_container_Sergey_Novikov_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.