CVE-2022-1706:
Ignition config accessible to unprivileged software on VMware
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/25/2022
Updated
1/11/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/coreos/ignition/v2 | go | < 2.14.0 | 2.14.0 |
github.com/coreos/ignition | go | <= 0.35.0 | 2.14.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Ignition retrieving cloud-init configs from hypervisor-specific storage (VMware guestinfo/VirtualBox properties) without subsequently deleting them. The key vulnerable functions are the config retrieval handlers in platform providers that lacked deletion logic. The patches introduced DelConfig methods and ignition-rmcfg to remove these artifacts post-retrieval. During exploitation, these unpatched retrieval functions would appear in stack traces when Ignition processes (but doesn't clean) sensitive configs, leaving them accessible through hypervisor interfaces.