Miggo Logo

CVE-2022-1706:
Ignition config accessible to unprivileged software on VMware

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
5/25/2022
Updated
1/11/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/coreos/ignition/v2go< 2.14.02.14.0
github.com/coreos/ignitiongo<= 0.35.02.14.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Ignition retrieving cloud-init configs from hypervisor-specific storage (VMware guestinfo/VirtualBox properties) without subsequently deleting them. The key vulnerable functions are the config retrieval handlers in platform providers that lacked deletion logic. The patches introduced DelConfig methods and ignition-rmcfg to remove these artifacts post-retrieval. During exploitation, these unpatched retrieval functions would appear in stack traces when Ignition processes (but doesn't clean) sensitive configs, leaving them accessible through hypervisor interfaces.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Unprivil**** so*tw*r* in VMw*r* VMs, in*lu*in* so*tw*r* runnin* in unprivil**** *ont*in*rs, **n r*tri*v* *n I*nition *on*i* stor** in * *yp*rvisor *u*stin*o v*ri**l* or OV* *nvironm*nt. I* t** I*nition *on*i* *ont*ins s**r*ts, t*is **n r*

Reasoning

T** vuln*r**ility st*ms *rom I*nition r*tri*vin* *lou*-init *on*i*s *rom *yp*rvisor-sp**i*i* stor*** (VMw*r* *u*stin*o/Virtu*l*ox prop*rti*s) wit*out su*s*qu*ntly **l*tin* t**m. T** k*y vuln*r**l* *un*tions *r* t** *on*i* r*tri*v*l **n*l*rs in pl*t*o