CVE-2022-36103: CWE-732: Incorrect Permission Assignment for Critical Resource in siderolabs talos
Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don't run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don't allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.
AI Analysis
Technical Summary
CVE-2022-36103 is a vulnerability in Talos Linux, a specialized Linux distribution designed for Kubernetes deployments, particularly focusing on secure and immutable infrastructure for Kubernetes clusters. The vulnerability stems from improper permission assignment and validation during the signing process of worker node certificate signing requests (CSRs) by the Talos control plane node. Specifically, when a worker node attempts to join a Talos cluster, it uses a join token to authenticate and request a certificate. Due to incorrect validation, the control plane node may erroneously issue a Talos API certificate granting full access privileges to the Talos API on the control plane node. This elevated access can expose sensitive cluster information, including Kubernetes and Talos Public Key Infrastructure (PKI) details, effectively allowing an attacker to gain full control over the Kubernetes cluster and its underlying Talos infrastructure. The join token, which is critical for authenticating worker nodes, is stored in the machine configuration on the worker node. Under normal secure configurations, Kubernetes workloads running on the worker node do not have access to this machine configuration. However, if the cluster is misconfigured—specifically if workloads are allowed to mount hostPath volumes or access host networking—these workloads could potentially access the machine configuration and extract the join token. This would enable them to impersonate legitimate worker nodes and exploit the certificate signing flaw to gain control over the cluster. The vulnerability has been addressed in Talos version 1.2.2. Additionally, enabling Kubernetes Pod Security Standards (PSS) baseline policies mitigates the risk by denying hostPath mounts and host networking by default, reducing the attack surface. Clusters that do not run untrusted workloads or that have strict Pod Security configurations preventing hostPath mounts and secure access to cloud metadata servers are not affected. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using Talos Linux for Kubernetes deployments, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their container orchestration environments. Successful exploitation could lead to full cluster compromise, allowing attackers to control Kubernetes workloads, access sensitive data, and potentially disrupt critical business applications. This is particularly impactful for organizations relying on Kubernetes for production workloads, including cloud service providers, financial institutions, healthcare providers, and critical infrastructure operators. The exposure of Talos PKI and Kubernetes secrets could facilitate lateral movement and persistent access within enterprise environments. Misconfigured clusters that allow untrusted workloads or hostPath mounts are especially vulnerable, increasing the likelihood of insider threats or compromised containers escalating privileges. Although no active exploitation is known, the potential impact warrants urgent attention to patching and configuration hardening to prevent future attacks.
Mitigation Recommendations
1. Upgrade all Talos Linux deployments to version 1.2.2 or later immediately to ensure the vulnerability is patched. 2. Enforce Kubernetes Pod Security Standards baseline or higher policies to deny hostPath volume mounts and host networking for workloads, minimizing the risk of unauthorized access to the machine configuration. 3. Audit existing Kubernetes cluster configurations to identify and remediate any workloads with hostPath mounts or host networking privileges. 4. Restrict access to the machine configuration and cloud metadata servers, ensuring that sensitive join tokens are not exposed to untrusted workloads. 5. Implement strict RBAC policies to limit which workloads and users can request certificate signing or access cluster control plane APIs. 6. Monitor cluster logs and API access patterns for unusual certificate signing requests or unexpected Talos API usage. 7. Conduct regular security reviews and penetration tests focusing on Kubernetes cluster join processes and workload isolation. 8. Educate DevOps and security teams about secure Kubernetes workload configurations and the risks of hostPath mounts and host networking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Belgium, Switzerland
CVE-2022-36103: CWE-732: Incorrect Permission Assignment for Critical Resource in siderolabs talos
Description
Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don't run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don't allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.
AI-Powered Analysis
Technical Analysis
CVE-2022-36103 is a vulnerability in Talos Linux, a specialized Linux distribution designed for Kubernetes deployments, particularly focusing on secure and immutable infrastructure for Kubernetes clusters. The vulnerability stems from improper permission assignment and validation during the signing process of worker node certificate signing requests (CSRs) by the Talos control plane node. Specifically, when a worker node attempts to join a Talos cluster, it uses a join token to authenticate and request a certificate. Due to incorrect validation, the control plane node may erroneously issue a Talos API certificate granting full access privileges to the Talos API on the control plane node. This elevated access can expose sensitive cluster information, including Kubernetes and Talos Public Key Infrastructure (PKI) details, effectively allowing an attacker to gain full control over the Kubernetes cluster and its underlying Talos infrastructure. The join token, which is critical for authenticating worker nodes, is stored in the machine configuration on the worker node. Under normal secure configurations, Kubernetes workloads running on the worker node do not have access to this machine configuration. However, if the cluster is misconfigured—specifically if workloads are allowed to mount hostPath volumes or access host networking—these workloads could potentially access the machine configuration and extract the join token. This would enable them to impersonate legitimate worker nodes and exploit the certificate signing flaw to gain control over the cluster. The vulnerability has been addressed in Talos version 1.2.2. Additionally, enabling Kubernetes Pod Security Standards (PSS) baseline policies mitigates the risk by denying hostPath mounts and host networking by default, reducing the attack surface. Clusters that do not run untrusted workloads or that have strict Pod Security configurations preventing hostPath mounts and secure access to cloud metadata servers are not affected. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using Talos Linux for Kubernetes deployments, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their container orchestration environments. Successful exploitation could lead to full cluster compromise, allowing attackers to control Kubernetes workloads, access sensitive data, and potentially disrupt critical business applications. This is particularly impactful for organizations relying on Kubernetes for production workloads, including cloud service providers, financial institutions, healthcare providers, and critical infrastructure operators. The exposure of Talos PKI and Kubernetes secrets could facilitate lateral movement and persistent access within enterprise environments. Misconfigured clusters that allow untrusted workloads or hostPath mounts are especially vulnerable, increasing the likelihood of insider threats or compromised containers escalating privileges. Although no active exploitation is known, the potential impact warrants urgent attention to patching and configuration hardening to prevent future attacks.
Mitigation Recommendations
1. Upgrade all Talos Linux deployments to version 1.2.2 or later immediately to ensure the vulnerability is patched. 2. Enforce Kubernetes Pod Security Standards baseline or higher policies to deny hostPath volume mounts and host networking for workloads, minimizing the risk of unauthorized access to the machine configuration. 3. Audit existing Kubernetes cluster configurations to identify and remediate any workloads with hostPath mounts or host networking privileges. 4. Restrict access to the machine configuration and cloud metadata servers, ensuring that sensitive join tokens are not exposed to untrusted workloads. 5. Implement strict RBAC policies to limit which workloads and users can request certificate signing or access cluster control plane APIs. 6. Monitor cluster logs and API access patterns for unusual certificate signing requests or unexpected Talos API usage. 7. Conduct regular security reviews and penetration tests focusing on Kubernetes cluster join processes and workload isolation. 8. Educate DevOps and security teams about secure Kubernetes workload configurations and the risks of hostPath mounts and host networking.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3e18
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:04:43 PM
Last updated: 8/12/2025, 3:31:40 AM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.