{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T21:55:55.707","vulnerabilities":[{"cve":{"id":"CVE-2024-31989","sourceIdentifier":"security-advisories@github.com","published":"2024-05-21T19:15:09.770","lastModified":"2025-01-09T16:56:47.220","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10."},{"lang":"es","value":"Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Se ha descubierto que un pod sin privilegios en un espacio de nombres diferente en el mismo clúster podría conectarse al servidor Redis en el puerto 6379. A pesar de haber instalado la última versión del complemento VPC CNI en el clúster EKS, requiere habilitación manual a través de la configuración para aplicar políticas de red. Esto genera preocupación de que muchos clientes, sin saberlo, puedan tener acceso abierto a sus servidores Redis. Esta vulnerabilidad podría provocar una escalada de privilegios al nivel del controlador del clúster o una fuga de información, afectando a cualquiera que no tenga controles de acceso estrictos en su instancia de Redis. Este problema se solucionó en las versiones 2.8.19, 2.9.15 y 2.10.10."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-327"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-327"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.19","matchCriteriaId":"475A2C91-B3E2-4A69-AEEF-D74F78FC362C"},{"vulnerable":true,"criteria":"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.0","versionEndExcluding":"2.9.15","matchCriteriaId":"215C1D38-F859-4673-8F7F-F45422529899"},{"vulnerable":true,"criteria":"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*","versionStartIncluding":"2.10.0","versionEndExcluding":"2.10.10","matchCriteriaId":"9E7EF8CD-8ED1-45BF-8074-D399B318FECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*","versionStartIncluding":"2.11.0","versionEndExcluding":"2.11.1","matchCriteriaId":"F626FD3D-7C00-4C34-A131-7ABF40BD1D0E"}]}]}],"references":[{"url":"https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}