A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2994 A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.
Github GHSA Github GHSA GHSA-8jpg-62jc-hwhr VM images built with Image Builder with some providers use default credentials during builds in github.com/kubernetes-sigs/image-builder
Fixes

Solution

Rebuild any affected images using a fixed version of Image Builder. Re-deploy the fixed images to any affected VMs.


Workaround

No workaround given by the vendor.

History

Tue, 09 Dec 2025 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Kubernetes-sigs
Kubernetes-sigs image Builder
CPEs cpe:2.3:a:kubernetes-sigs:image_builder:*:*:*:*:*:*:*:*
Vendors & Products Kubernetes-sigs
Kubernetes-sigs image Builder

Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00443}

epss

{'score': 0.00454}


Thu, 29 May 2025 01:45:00 +0900

Type Values Removed Values Added
References

Thu, 22 May 2025 11:30:00 +0900


Thu, 17 Oct 2024 02:15:00 +0900

Type Values Removed Values Added
First Time appeared Kubernetes
Kubernetes image Builder
CPEs cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*
Vendors & Products Kubernetes
Kubernetes image Builder
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Oct 2024 10:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 16 Oct 2024 05:45:00 +0900

Type Values Removed Values Added
Description A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.
Title VM images built with Image Builder with some providers use default credentials during builds
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published:

Updated: 2024-10-16T16:21:56.147Z

Reserved: 2024-10-07T16:39:37.106Z

Link: CVE-2024-9594

cve-icon Vulnrichment

Updated: 2024-10-16T16:21:50.081Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-15T21:15:11.790

Modified: 2025-12-08T18:51:47.483

Link: CVE-2024-9594

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-15T20:37:01Z

Links: CVE-2024-9594 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses