CVE-2022-2995: CWE-284 in cri-o
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
AI Analysis
Technical Summary
CVE-2022-2995 is a high-severity vulnerability identified in the CRI-O container engine, specifically version 1.25.0. The vulnerability arises from incorrect handling of supplementary groups within containers managed by CRI-O. Supplementary groups are used to set access permissions for files and resources inside containers. Due to this flaw, if an attacker gains the ability to execute binary code inside an affected container and supplementary groups are configured, they may exploit this vulnerability to disclose sensitive information or modify data improperly. The vulnerability is classified under CWE-284, which pertains to improper access control. The CVSS 3.1 base score is 7.1, reflecting a high severity with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). This means an attacker with some level of access inside the container can leverage this flaw without needing further user interaction to compromise confidentiality and integrity of data. No known exploits are reported in the wild, and no patches are explicitly linked in the provided data, but the vulnerability was published on September 19, 2022. The issue is significant because CRI-O is a widely used container runtime in Kubernetes environments, especially in cloud-native deployments, and improper access control can lead to privilege escalation or data breaches within containerized applications.
Potential Impact
For European organizations, the impact of CVE-2022-2995 can be substantial, especially those relying on Kubernetes clusters using CRI-O as their container runtime. Sensitive data within containers could be exposed or altered by attackers who have gained limited access to container environments, potentially leading to data breaches, compliance violations (such as GDPR), and disruption of business operations. Since the vulnerability requires local access to the container and the ability to execute code, it primarily threatens environments where attackers can already infiltrate container workloads, such as through compromised applications or insider threats. The integrity and confidentiality of containerized workloads are at risk, which can affect critical services, especially in sectors like finance, healthcare, and government where containerized applications are increasingly deployed. The lack of impact on availability reduces the risk of denial-of-service but does not diminish the threat to data security and trustworthiness of containerized applications.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade CRI-O to a version where this vulnerability is fixed; since no patch links are provided, checking the official CRI-O or Kubernetes security advisories for updates beyond version 1.25.0 is critical. 2) Restrict container access strictly, minimizing the number of users or processes that can execute binaries inside containers, especially those with supplementary groups configured. 3) Implement strict container runtime security policies using tools like SELinux, AppArmor, or seccomp to limit the capabilities of containers and prevent unauthorized code execution. 4) Employ runtime security monitoring and anomaly detection to identify suspicious activities within containers. 5) Use multi-factor authentication and strong access controls for Kubernetes cluster management to reduce the risk of initial compromise. 6) Regularly audit container configurations and permissions, ensuring supplementary groups are used appropriately and securely. 7) Consider isolating sensitive workloads in dedicated namespaces or clusters to limit lateral movement in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2022-2995: CWE-284 in cri-o
Description
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
AI-Powered Analysis
Technical Analysis
CVE-2022-2995 is a high-severity vulnerability identified in the CRI-O container engine, specifically version 1.25.0. The vulnerability arises from incorrect handling of supplementary groups within containers managed by CRI-O. Supplementary groups are used to set access permissions for files and resources inside containers. Due to this flaw, if an attacker gains the ability to execute binary code inside an affected container and supplementary groups are configured, they may exploit this vulnerability to disclose sensitive information or modify data improperly. The vulnerability is classified under CWE-284, which pertains to improper access control. The CVSS 3.1 base score is 7.1, reflecting a high severity with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). This means an attacker with some level of access inside the container can leverage this flaw without needing further user interaction to compromise confidentiality and integrity of data. No known exploits are reported in the wild, and no patches are explicitly linked in the provided data, but the vulnerability was published on September 19, 2022. The issue is significant because CRI-O is a widely used container runtime in Kubernetes environments, especially in cloud-native deployments, and improper access control can lead to privilege escalation or data breaches within containerized applications.
Potential Impact
For European organizations, the impact of CVE-2022-2995 can be substantial, especially those relying on Kubernetes clusters using CRI-O as their container runtime. Sensitive data within containers could be exposed or altered by attackers who have gained limited access to container environments, potentially leading to data breaches, compliance violations (such as GDPR), and disruption of business operations. Since the vulnerability requires local access to the container and the ability to execute code, it primarily threatens environments where attackers can already infiltrate container workloads, such as through compromised applications or insider threats. The integrity and confidentiality of containerized workloads are at risk, which can affect critical services, especially in sectors like finance, healthcare, and government where containerized applications are increasingly deployed. The lack of impact on availability reduces the risk of denial-of-service but does not diminish the threat to data security and trustworthiness of containerized applications.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade CRI-O to a version where this vulnerability is fixed; since no patch links are provided, checking the official CRI-O or Kubernetes security advisories for updates beyond version 1.25.0 is critical. 2) Restrict container access strictly, minimizing the number of users or processes that can execute binaries inside containers, especially those with supplementary groups configured. 3) Implement strict container runtime security policies using tools like SELinux, AppArmor, or seccomp to limit the capabilities of containers and prevent unauthorized code execution. 4) Employ runtime security monitoring and anomaly detection to identify suspicious activities within containers. 5) Use multi-factor authentication and strong access controls for Kubernetes cluster management to reduce the risk of initial compromise. 6) Regularly audit container configurations and permissions, ensuring supplementary groups are used appropriately and securely. 7) Consider isolating sensitive workloads in dedicated namespaces or clusters to limit lateral movement in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-08-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6838cb41182aa0cae28e8851
Added to database: 5/29/2025, 9:01:53 PM
Last enriched: 7/7/2025, 11:11:27 PM
Last updated: 2/7/2026, 9:52:06 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.