Back to all scenarios
Scenario #254
Security
K8s v1.22, Azure AKS
Rogue Container Executing Malicious Code
A compromised container running a known exploit executed malicious code that allowed the attacker to gain access to the underlying node.
Find this helpful?
What Happened
A container running an outdated image with known vulnerabilities was exploited. The attacker used this vulnerability to gain access to the underlying node and execute malicious commands.
Diagnosis Steps
- 1Conducted a forensic investigation and found that a container was running an outdated image with an unpatched exploit.
- 2Detected that the attacker used this vulnerability to escape the container and execute commands on the node.
Root Cause
Running containers with outdated or unpatched images introduced security vulnerabilities.
Fix/Workaround
• Updated the container images to the latest versions with security patches.
• Implemented automatic image scanning and vulnerability scanning as part of the CI/CD pipeline to catch outdated images before deployment.
Lessons Learned
Regularly update container images and scan for vulnerabilities to reduce the attack surface.
How to Avoid
- 1Implement automated image scanning tools to identify vulnerabilities before deploying containers.
- 2Enforce policies to only allow trusted and updated images to be used in production.