New Vulnerability in CRI-O Engine Lets Attackers Escape Kubernetes Containers

17-Mar-22

According to CrowdStrike researchers John Walker and Manoj Ahuje, ““invoking CVE-2022-0811 can allow an attacker to perform a variety of operations on goals, including malware execution, data exfiltration, and lateral movement among pods.””

CRI-O is a container runtime implementation of the Kubernetes Container Runtime Interface (CRI) that’s used to pull container images from registries and launch an Open Container Initiative (OCI)-compatible runtime like runC to spawn and run container processes. It’s a lightweight alternative to Docker.

Read More…