Manage VolumeAttachments (Cluster-wide Storage/Node Manipulation)
Tampering
Critical
Overview
| Field | Value |
|---|---|
| ID | 1102 |
| Name | Manage VolumeAttachments (Cluster-wide Storage/Node Manipulation) |
| Risk Category | Tampering |
| Risk Level | Critical |
| Role Type | ClusterRole |
| API Groups | storage.k8s.io |
| Resources | volumeattachments |
| Risky Verb Combinations | [create] · [update] · [patch] · [delete] · [get] · [list] · [watch] |
| Tags | DataExposure DenialOfService NodeAccess PotentialPrivilegeEscalation StorageManipulation (+1 more) |
Description
Allows managing VolumeAttachment objects cluster-wide. VolumeAttachments link persistent volumes to nodes. Control over these can allow an attacker to detach volumes from nodes (DoS), potentially attach volumes to attacker-controlled nodes (data theft), or interfere with legitimate storage operations.
Abuse Scenarios
- List all VolumeAttachments in the cluster.
kubectl get volumeattachments
- Delete a VolumeAttachment, potentially detaching a volume and causing disruption.
kubectl delete volumeattachment <volumeattachment-name>
# Example: kubectl delete volumeattachment pvc-12345-node-minikube