Overview

FieldValue
ID1055
NameManage CSIDrivers (potential node compromise)
Risk CategoryElevation of Privilege
Risk LevelCritical
Role TypeClusterRole
API Groupsstorage.k8s.io
Resourcescsidrivers
Risky Verb Combinations[create] · [update] · [patch] · [delete]
TagsNodeAccess PrivilegeEscalation StorageManipulation Tampering

Description

Allows creating, updating, or deleting CSIDrivers. CSIDrivers define how container orchestrators interact with storage systems. A malicious CSIDriver could potentially compromise nodes by running privileged operations or exfiltrating data, leading to privilege escalation and node access.

Abuse Scenarios

  1. Create a new CSIDriver that could be used for malicious purposes.
kubectl create -f - <<EOF
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
  name: malicious.csi.example.com
spec:
  attachRequired: false
  podInfoOnMount: false
  volumeLifecycleModes:
    - Persistent
EOF
# Example: kubectl create -f - <<EOF ... EOF
  1. Delete an existing CSIDriver, disrupting storage operations.
kubectl delete csidriver <csidriver-name>
# Example: kubectl delete csidriver ebs.csi.aws.com