meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, January 3rd, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 January 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Kyverno image swap vuln; Google Home Vuln; 3G CDMA Decomissioning; EarSpy Cell Phone Evesdropping

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, January 3, 2020,

0:05.1

edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich,

0:10.3

and then I'm recording from Jacksonville, Florida.

0:15.0

Container security company Armo is warning of vulnerability in Coverno.

0:21.6

Coverno is what's often called an admission controller for Kubernetes, and what essentially

0:28.6

does is it checks if a particular image that you're loading in your Kubernetes cluster is safe to run.

0:36.6

So the basic workflow with this admission controller is that if Kubernetes is being asked

0:42.1

to run a particular workload, the admission controller is asked to verify if the workload

0:48.4

is safe to run.

0:50.0

In order to do this, the admission controller will go to the container registry, retrieve the payload, and then basically check.

0:57.3

Does the signature workout?

0:58.6

And is it safe?

1:00.4

Well, and then it basically gives the OK to Kubernetes to download that image.

1:06.5

The problem here is that one of the scenarios is that NetHacker actually is controlling this registry,

1:15.6

which is one of the reasons why we want something like the admission controller.

1:20.6

And if NetHacker is in charge and controlling the registry, well, they could very well provide

1:27.1

one image to the admission

1:28.9

controller and then a different image to Kubernetes to actually run.

1:34.2

The fixed switch has been deployed already by Coverno in version 183.

1:40.4

It does make sure that the hash of the image that was verified is the same as the hash of the

1:46.6

image that actually was retrieved by Kubernetes, so that way the attacker can't swap out these

1:54.9

images.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.