CVE-2023-47630: Attacker can cause Kyverno user to unintentionally consume insecure image
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67379%
CWE
Published
11/14/2023
Updated
11/14/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/kyverno/kyverno | go | < 1.10.5 | 1.10.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability fundamentally involves insufficient digest validation when resolving container images. Key evidence includes:
- The CWE-345 (Insufficient Verification of Data Authenticity) mapping
- Release notes explicitly mention adding 'a check for digest mismatch in verifyImages rules' (#8443)
- The attack vector requires registry compromise to manipulate digests, implying the vulnerability existed in the image resolution/verification flow
- Kyverno's own security advisory confirms the root cause was in their codebase (not Cosign)
These functions are core to Kyverno's image verification process, and the explicit mention of a digest mismatch check being added indicates these were the areas lacking proper validation prior to patching.