CVE-2020-35189:Kong Docker images before 1.0.2-alpine contain a blank root password vulnerability allowing unauthorized root access.

splash
Back

Description Preview

The official Kong Docker images for Alpine Linux versions prior to 1.0.2-alpine were distributed with a dangerous security misconfiguration. These images were configured with a root user account that had no password set, creating a critical authentication bypass vulnerability. Any remote attacker who could access the container could potentially gain full root privileges simply by logging in without providing any password. This vulnerability represents a severe security risk as it allows complete system compromise of affected Kong containers.

Overview

This vulnerability (CVE-2020-35189) is classified as CWE-306 (Missing Authentication for Critical Function). The issue affects only the Alpine-specific Kong Docker images prior to version 1.0.2-alpine. The vulnerability stems from an improper configuration where the root user account was created with a blank password. In containerized environments, this could allow attackers who gain access to the container to escalate privileges to root without any authentication, effectively bypassing all security controls. Organizations running these vulnerable Kong containers in production environments face significant risk of unauthorized access and potential data breaches.

Remediation

To address this vulnerability, organizations should take the following actions:

  1. Immediately update Kong Docker images to version 1.0.2-alpine or later.
  2. Audit all existing Kong container deployments to identify instances running vulnerable versions.
  3. Replace any running containers based on vulnerable images with updated versions.
  4. Consider implementing additional container security measures such as:
    • Running containers with non-root users
    • Implementing proper network segmentation
    • Using container security scanning tools
    • Setting up proper authentication mechanisms for container access
  5. Review security logs for any signs of unauthorized access to Kong containers.

References

  • Original vulnerability disclosure: https://github.com/koharin/koharin2/blob/main/CVE-2020-35189
  • MITRE CVE Entry: CVE-2020-35189
  • CWE-306: Missing Authentication for Critical Function
  • Kong Docker Official Images: https://hub.docker.com/_/kong

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  5. Construction
    Construction
  6. Educational Services
    Educational Services
  7. Finance and Insurance
    Finance and Insurance
  8. Health Care & Social Assistance
    Health Care & Social Assistance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database