Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Microsoft Warns of Attackers Exploiting Misconfigured Apache Pinot Installations

Misconfigured Apache Pinot instances can and have enabled threat actors to gain access to sensitive information. 

Kubernetes vulnerability

Research conducted by Microsoft into the security of Kubernetes installations revealed that threat actors have targeted misconfigured Apache Pinot instances.

Apache Pinot is an open source real-time analytics platform designed for querying large datasets with high speed and low latency. Pinot is used by some of the world’s biggest companies, including Walmart, Uber, Slack, LinkedIn, Wix and Stripe.

In the case of Kubernetes installations, the official Apache Pinot documentation does not inform users that the default configuration is highly insecure and can expose sensitive user data.

“The default installation exposes Apache Pinot’s main components to the internet by Kubernetes LoadBalancer services without providing any authentication mechanism by default,” Microsoft researchers explained.

They warned that an unauthenticated attacker can gain full access to the Pinot dashboard, enabling them to query the stored data and manage workloads. 

The risk is not just theoretical. Microsoft said it identified several instances of misconfigured Pinot workloads being targeted in the wild to access user data.

Microsoft’s analysis into misconfigurations and the lack of proper authentication or authorization mechanisms showed that “a small but critical group of applications either provided no authentication at all or used a predefined user and password for logging in, making them prime targets for attackers”. 

Microsoft researchers found that Meshery, an engineering platform for collaborative design and operation of cloud infrastructure, is affected by a vulnerability that allows an attacker to execute arbitrary code and gain control of underlying resources. 

Advertisement. Scroll to continue reading.

The attacker needs to have access to the external IP address that exposes the application interface, and attacks can be prevented by restricting Meshery access to internal networks.

“Many in-the-wild exploitations of containerized applications originate in misconfigured workloads, often when using default settings,” the tech giant concluded.

Related: IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking

Related: Azure Kubernetes Services Vulnerability Exposed Sensitive Information

Related: OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes Clusters for Cryptomining

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.