Overview

FieldValue
ID1055
NameManage CSIDrivers (potential node compromise)
Risk CategoryElevation of Privilege
Risk LevelCritical
Role TypeClusterRole
API Groupsstorage.k8s.io
Resourcescsidrivers
Verbscreate, update, patch, delete
TagsNodeAccess PrivilegeEscalation StorageManipulation Tampering

Description

Allows creating, updating, or deleting CSIDrivers. CSIDrivers define how container orchestrators interact with storage systems. A malicious CSIDriver could potentially compromise nodes by running privileged operations or exfiltrating data, leading to privilege escalation and node access.

Abuse Scenarios

  1. Create a new CSIDriver that could be used for malicious purposes.
kubectl create -f - <<EOF
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
  name: malicious.csi.example.com
spec:
  attachRequired: false
  podInfoOnMount: false
  volumeLifecycleModes:
    - Persistent
EOF
# Example: kubectl create -f - <<EOF ... EOF
  1. Delete an existing CSIDriver, disrupting storage operations.
kubectl delete csidriver <csidriver-name>
# Example: kubectl delete csidriver ebs.csi.aws.com