ronenshh Profile Banner
Ronen Shustin Profile
Ronen Shustin

@ronenshh

Followers
2K
Following
3K
Media
10
Statuses
70

Vulnerability Research at @wiz_io

Joined August 2011
Don't wanna be here? Send us removal request.
@ronenshh
Ronen Shustin
2 months
RT @wiz_io: 🏆 Wiz Research took 1st place in #Pwn2Own's first-ever AI category, competing against global teams targeting critical AI infras….
0
8
0
@ronenshh
Ronen Shustin
4 months
With this research, we hope to raise awareness within the @kubernetesio community about this often-underestimated attack surface. ☁️⚠️.
0
0
5
@ronenshh
Ronen Shustin
4 months
Throughout our research, we’ve seen many admission controllers running with high privileges. Their complex logic increases the chances of vulnerabilities—as we demonstrated with Ingress-NGINX. 🎯.
1
0
6
@ronenshh
Ronen Shustin
4 months
Pods lacking proper network isolation can communicate directly with admission controllers. This creates a potential escalation path where attackers can send AdmissionReview requests directly—something that should technically only be done by the API server. 🚨.
1
0
4
@ronenshh
Ronen Shustin
4 months
We started exploring admission controllers a while back, recognizing them as an often-overlooked attack surface. They’re essentially web servers—unauthenticated and exposing additional network-accessible endpoints within the cluster.
1
0
5
@ronenshh
Ronen Shustin
4 months
This was a huge effort from the team. With every small primitive we discovered, we got closer—until we finally landed a full unauthenticated RCE. I had a ton of fun working on this research. ☸️👇.
@nirohfeld
Nir Ohfeld
4 months
We (+@sagitz_ @ronenshh @hillai) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX". The impact?. From zero permissions ➡️ to complete cluster takeover 🤯. This is the story of #IngressNightmare 🧵⬇️
Tweet media one
3
3
51
@ronenshh
Ronen Shustin
5 months
Personally, though I’m biased 😏, this is one of the coolest container escape vulnerabilities.
0
1
2
@ronenshh
Ronen Shustin
5 months
A couple of months ago, we at @wiz_io discovered a container escape vulnerability in the NVIDIA Container Toolkit, which impacts many cloud and AI SaaS providers. We're finally able to share the technical details.
3
17
73
@ronenshh
Ronen Shustin
10 months
For more details about this issue, check out our blog:.
0
1
11
@ronenshh
Ronen Shustin
10 months
Update to v1.16.2 of the NVIDIA Container Toolkit and v24.6.2 of the NVIDIA GPU Operator to secure your AI infrastructure. Environments running untrusted container images are most at risk and should update immediately.
Tweet media one
1
0
7
@ronenshh
Ronen Shustin
10 months
This vulnerability significantly impacts systems that use containers with NVIDIA GPUs. Our data at @wiz_io shows that over 33% of cloud environments are vulnerable to this issue.
1
1
4
@ronenshh
Ronen Shustin
10 months
By leveraging the container runtime Unix socket, we can achieve full Remote Code Execution (RCE) on the host by spawning a new privileged container.
1
2
9
@ronenshh
Ronen Shustin
10 months
Furthermore, most container orchestration solutions (Docker, containerd, K8s) have runtime Unix sockets used to manage containers. While our host filesystem mount is read-only, Unix sockets are not restricted by this limitation.
1
0
4
@ronenshh
Ronen Shustin
10 months
Soon enough, we discovered a security issue in NCT. With a specially crafted container image, it's possible to mount the host's filesystem into the container when it spawns. This could potentially expose secrets and other sensitive information from the host.
1
0
5
@ronenshh
Ronen Shustin
10 months
While researching AI SaaS/Cloud providers, we (the research team at @wiz_io) noticed that the Nvidia Container Toolkit, aka NCT, is widely used to enable GPU access in containers… . So, we decided to take a closer look 👀
Tweet media one
1
1
7
@ronenshh
Ronen Shustin
10 months
We discovered a container escape vulnerability in the @NVIDIA Container Toolkit. It allows attackers to gain full access to the host's filesystem and achieve Remote Code Execution (RCE). Here's everything you need to know about CVE-2024-0132 🧵👇
4
72
297
@ronenshh
Ronen Shustin
2 years
This is gold.
@memenetes
memenetes
2 years
Multi-tenancy in Kubernetes
Tweet media one
3
1
22
@ronenshh
Ronen Shustin
2 years
Our findings highlight security issues that could occur in any Kubernetes environment, recommended read for Kubernetes users and defenders. Read the full technical details here:
5
37
132
@ronenshh
Ronen Shustin
2 years
We disclosed all of our findings to Alibaba Cloud. Alibaba Cloud rapidly investigated and fixed the vulnerabilities we discovered. Alibaba Cloud's security team took the issues very seriously and addressed them promptly and professionally.
1
0
34
@ronenshh
Ronen Shustin
2 years
Contrary to AnalyticDB, in our ApsaraDB RDS research, we discovered that the K8s node hosting our ApsaraDB RDS instance also hosted the database instances of other customers. So, we had immediate access to other customers' data upon escaping the RDS container!.
1
0
20