Back to all scenarios
Scenario #295
Security
Kubernetes v1.22, CRI-O on Bare Metal

Node Compromise via Insecure Container Runtime

A CVE in the container runtime allowed a container breakout, leading to full node compromise.

Find this helpful?
What Happened

An attacker exploited CRI-O vulnerability (CVE-2022-0811) that allowed containers to overwrite host paths via sysctl injection.

Diagnosis Steps
  • 1Detected abnormal node CPU spike and external traffic.
  • 2Inspected containers – found sysctl modifications.
  • 3Cross-verified with known CVEs.
Root Cause

Unpatched CRI-O vulnerability and default seccomp profile disabled.

Fix/Workaround
• Upgraded CRI-O to patched version.
• Enabled seccomp and AppArmor by default.
Lessons Learned

Container runtimes must be hardened and patched like any system component.

How to Avoid
  • 1Automate CVE scanning for runtime components.
  • 2Harden runtimes with security profiles.