Missing Encryption of Sensitive Data Affecting k3s package, versions <1.21.3.1-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Encryption of Sensitive Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE319-K3S-6109720
  • published8 Dec 2023
  • disclosed28 Jul 2021

Introduced: 28 Jul 2021

CVE-2021-32001  (opens in a new tab)
CWE-311  (opens in a new tab)

How to fix?

Upgrade Alpine:3.19 k3s to version 1.21.3.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream k3s package and not the k3s package as distributed by Alpine. See How to fix? for Alpine:3.19 relevant fixed versions and status.

K3s in SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup, to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc.) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.

CVSS Scores

version 3.1