Back to all scenarios
Scenario #265
Security
Kubernetes v1.23, AWS EKS

Use of Vulnerable Container Images

Deployment of container images with known vulnerabilities led to potential exploitation risks.

Find this helpful?
What Happened

Applications were deployed using outdated container images that contained known vulnerabilities. These vulnerabilities could be exploited by attackers to compromise the application and potentially the cluster.

Diagnosis Steps
  • 1Scanned container images for known vulnerabilities.
  • 2Identified outdated packages and unpatched security issues.
  • 3Assessed the potential impact of the identified vulnerabilities.
Root Cause

Use of outdated and vulnerable container images in deployments.

Fix/Workaround
• Updated container images to the latest versions with security patches.
• Implemented automated image scanning in the CI/CD pipeline.
• Established a policy to use only trusted and regularly updated images.
Lessons Learned

Regularly update and scan container images to mitigate security risks.

How to Avoid
  • 1Integrate image scanning tools into the development workflow.
  • 2Maintain an inventory of approved and secure container images.