Back to all scenarios
Scenario #273
Security
Kubernetes v1.24, GKE
Broken Container Escape Detection
A malicious container escaped to host level due to an unpatched kernel, but went undetected due to insufficient monitoring.
Find this helpful?
What Happened
A CVE affecting cgroups allowed container breakout. The attacker executed host-level commands and pivoted laterally across nodes.
Diagnosis Steps
- 1Investigated suspicious node-level activity.
- 2Detected unexpected binaries and processes running as root.
- 3Correlated with pod logs that had access to /proc.
Root Cause
Outdated host kernel + lack of runtime monitoring.
Fix/Workaround
• Patched all nodes to a secure kernel version.
• Implemented Falco to monitor syscall anomalies.
Lessons Learned
Container escape is rare but possible—plan for it.
How to Avoid
- 1Patch host OS regularly.
- 2Deploy tools like Falco or Sysdig for anomaly detection.