Impact & Risk Analysis
- Severity: Medium
- CIS Benchmark: CIS 5.2.8
- Impact: Network Spoofing & Traffic Interception. The
NET_RAWcapability allows a process to craft raw network packets. If a malicious container has this capability (which is enabled by default in Docker), an attacker can perform ARP spoofing, DNS spoofing, or create custom packets to bypass network firewalls within the cluster.
Common Misconfiguration
Running containers with default capabilities. Most container runtimes (like Docker) grantNET_RAW by default to allow tools like ping to work, but standard web applications and microservices rarely need it.
Vulnerable Example
Secure Example
Audit Procedure
List the policies in use for each namespace or check running pods to ensureNET_RAW is dropped.
Check Running Pods:
- Analyze: Look for
ALLorNET_RAWin the drop list. - Fail: If the output is empty (meaning default capabilities are used).
NET_RAW).
Remediation
- Update Application Manifests: Modify your Deployment YAMLs to explicitly drop
NET_RAWorALL. - Enforce Policy: Apply the restricted Pod Security Standard to your namespaces, as the
baselinepolicy typically permitsNET_RAW.

