24h | 7d | 30d

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.88%

KEV

Description

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 21 Posts
  • 93 Interactions

Fediverse

Profile picture

If you're running ingress-nginx in your Kubernetes cluster please take a look at this latest CVE details, it's a big one! Patches are out so please get updating as soon as you can!

kubernetes.io/blog/2025/03/24/

#Kubernetes #Nginx #Ingress #CloudNative

  • 12
  • 4
  • 15 hours ago
Profile picture

Kubernetesでingress-nginx使ってる各位は確認しておいた方が良いかもです

Ingress-nginx CVE-2025-1974: What You Need to Know | Kubernetes : 👀
---
kubernetes.io/blog/2025/03/24/

  • 9
  • 3
  • 12 hours ago
Profile picture

Jacob Sandum posted a detailed and well-written PoC for the IngressNightmare (CVE-2025-1974 ) vulnerability found in the Kubernetes ingress-nginx Admission Controller by Wiz (Woogle!). If you are looking for a quick way to reproduce the issue or validate detection and mitigation, take a look:
github.com/sandumjacob/Ingress

  • 8
  • 4
  • 1 hour ago
Profile picture

‼️ Wiz and Kubernetes released patches and an advisory for CVE-2025-1974 and friends, dubbed IngressNightmare. If you're shuttling web requests from the internet to your K8s cluster, you'll want to ensure you're on top of these. More here: runzero.com/blog/ingress-night

cc: @todb @rk

  • 7
  • 6
  • 21 hours ago
Profile picture

Ingress-nginx CVE-2025-1974: What You Need to Know - kubernetes.io/blog/2025/03/24/ #Kubernetes

  • 4
  • 2
  • 3 hours ago
Profile picture

"CVE-2025-1974 means that anything on the Pod network has a good chance of taking over your Kubernetes cluster, with no credentials or administrative access required."

ingress-nginx is deployed in 40% of k8s clusters.

kubernetes.io/blog/2025/03/24/

  • 3
  • 3
  • 18 hours ago
Profile picture
  • 2
  • 0
  • 4 hours ago
Profile picture

Here is a start on a cloud console shell script for a simple rolling upgrade of ingress-nginx.
Use at your own risk, no warranty implied.

But it might save you some time as a starting point to mitigating CVE-2025-1974

...which you should go do RIGHT NOW!

github.com/secwest/k8s-ingress

  • 1
  • 0
  • 18 hours ago
Profile picture

Well this is going to be a stinker. If you’re using nginx ingress a) you can’t trust other pods right now and b) just grow up and use a proper ingress like Traefik

kubernetes.io/blog/2025/03/24/

  • 0
  • 1
  • 7 hours ago
Profile picture

I'm a bit unhappy with the coverage for CVE-2025-1974. While it might be true that ">40%" of all #Kubernetes clusters run ingress-nginx, only a small fraction will actually at risk of being exploited. If you run an overlay network (non-IPv6) and don't let non-cluster-admins create Ingress resources, the risk is drastically reduced. Remains the risk of attacks by workloads directly talking to the webhook endpoint.

It's an exciting finding, but still… keep calm and patch.

  • 0
  • 1
  • Last hour
Profile picture

⚠️ Alerte sécurité sur Kubernetes :

Le 24 mars 2025, l’équipe de recherche de Wiz et les mainteneurs de Kubernetes ont dévoilé 5 vulnérabilités majeures affectant le très populaire Ingress-NGINX Controller (présent sur +40% des clusters).

Ces failles, dont la plus grave est CVE-2025-1974 (CVSS 9.8), permettent à un attaquant sans identifiants d’exécuter du code à distance (Remote Code Execution) et de prendre le contrôle complet du cluster Kubernetes, en accédant à tous les secrets (mots de passe, clés d’API, etc.).

Ce qui est en cause :
Le composant vulnérable est le Validating Admission Controller d’Ingress-NGINX. Il valide les objets "Ingress" mais est, par défaut, accessible sans authentification depuis le réseau interne du cluster – parfois même exposé publiquement.

Les chercheurs ont réussi à injecter des configurations NGINX malveillantes, puis à exécuter du code en important des bibliothèques à partir de fichiers temporaires via NGINX. Une véritable porte d’entrée invisible.

✅ Ce que vous devez faire rapidement:
Vérifiez si vous utilisez ingress-nginx :

kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx

Mettez à jour vers une version corrigée :

v1.12.1 ou v1.11.5

Si vous ne pouvez pas mettre à jour tout de suite :

Désactivez temporairement le webhook d’admission (voir instructions officielles).

[Sources officielles]
⬇️
Blog de recherche Wiz :
"IngressNightmare: 9.8 Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX"
👇
wiz.io/blog/ingress-nginx-kube

📢 Annonce de Kubernetes (Security Response Committee) :
"Ingress-nginx CVE-2025-1974: What You Need to Know"
👇
kubernetes.io/blog/2025/03/24/

  • 0
  • 0
  • 13 hours ago
Profile picture

Critical Kubernetes alert: CVE-2025-1974 in ingress-nginx allows remote code execution (CVSS 9.8). Patch now to v1.12.1, v1.11.5, or v1.10.7. Affects 40% of clusters - disable admission controller if you can't update immediately. -2025-1974 redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes alert: CVE-2025-1974 in ingress-nginx allows remote code execution (CVSS 9.8). Patch now to v1.12.1, v1.11.5, or v1.10.7. Disable admission controller if you can't update immediately. -2025-1974 Details: redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical alert for Kubernetes users: CVE-2025-1974 in ingress-nginx (CVSS 9.8) allows remote code execution and cluster takeover. Patch now to v1.12.1/v1.11.5 or disable admission controller. Check your clusters! -2025-1974 redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 11 hours ago
Profile picture

Wow, things are getting wild in the Kubernetes world! The name alone – "IngressNightmare" – gives me chills! 🤯 It's crucial to know this affects the Ingress NGINX Controller, *not* the NGINX Ingress Controller. That's a big difference!

Wiz really uncovered something huge. We're talking over 6,500 vulnerable clusters, with the potential for some serious Remote Code Execution (RCE). Ouch! They found that a scary 43% of cloud environments are impacted.

It appears, that these kinds of vulnerabilities often slip past standard scans. You really need manual penetration testing to catch them. And as a pentester myself, I can tell you, it's frequently like digging for buried treasure! 😅

Here are the CVEs to watch out for: CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-1974. These have a CVSS score of 9.8! So, you'll want to update to 1.12.1, 1.11.5, or 1.10.7 *immediately*. Another crucial step? See if your Admission Webhook Endpoint is exposed. Make sure you're limiting access. Don't need it? Then, turn it off!

So, what are your experiences with K8s security? I'm curious, what tools do you swear by? 🤔

  • 5
  • 2
  • 16 hours ago
Profile picture

We will be performing an emergency upgrade of our cluster infrastructure to patch a series of critical security vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514) on our NGINX containers. As a result there may be a brief/intermittent disruption to Mastodon availability over the next hour. We apologize for the inconvenience, and hope you can quickly return to enjoying all the Nicole memes. Please see status.vmst.io for more information. #vmstio

  • 2
  • 4
  • 7 hours ago
Profile picture

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller.

CVE-2025-1974 but also CVE-2025-1097 CVE-2025-1098 CVE-2025-24513 CVE-2025-24514

🔗 For more details about Ingress NGINX Controller for Kubernetes release vulnerability.circl.lu/bundle/

#kubernetes #vulnerability #cybersecurity #cve

  • 1
  • 4
  • 11 hours ago
Profile picture

Security researchers reveal critical vulnerabilities in Ingress #Nginx Controller for Kubernetes

The vulnerabilities are tracked as CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974, and when exploited, allows an attacker to take over a Kubernetes cluster

Administrators are advised to patch ASAP

#cybersecurity #vulnerabilitymanagement

thehackernews.com/2025/03/crit

  • 1
  • 1
  • 22 hours ago

Overview

  • vercel
  • next.js

21 Mar 2025
Published
23 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
49.79%

KEV

Description

Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3.

Statistics

  • 8 Posts
  • 13 Interactions

Fediverse

Profile picture

Hey folks, ready for your daily dose of cyber intel? ☕️

Tuesday's update is out and it's packed with need-to-know updates:

🚨 Critical Next.js Flaw: Authorization bypass vulnerability (CVE-2025-29927) impacting versions before 15.2.3. Upgrade ASAP or block those 'x-middleware-subrequest' headers!

🐜 Weaver Ant's Long Game: Chinese hackers spied on a telco network for four years using compromised Zyxel routers and custom web shells. Talk about persistence!

🐍 VanHelsing RaaS Emerges: A new ransomware player targeting Windows, ARM, ESXi systems. Keep an eye on this one!

☁️ Oracle Cloud Breach Claims: Did they or didn't they? Oracle denies a breach, but a threat actor is claiming otherwise.

🚂 Ukrainian Railway Hit: Cyberattack disrupts online ticket sales amidst crucial transport operations. Resilience is key.

🔄 DrayTek Router Chaos: ISPs are scrambling as DrayTek routers enter reboot loops. Potential vulnerability or buggy update at play.

🤖 AI-Enhanced Cybercrime: Europol warns that organized crime is leveling up with AI, partnering with state-aligned entities.

🛰️ Starlink Intercepted: Thai authorities seize Starlink transmitters headed for Myanmar scam centers. Criminals are finding ways around cut-offs.

🚓 Cybercrime Crackdown: 300+ suspects arrested in Africa for cyber scams. A win for international law enforcement!

🧬 23andMe's Bankruptcy Woes: Privacy advocates raise concerns about DNA data as 23andMe files for bankruptcy. What happens to all that genetic info?

🔒 Pennsylvania County Ransomware: Sensitive data stolen during a ransomware attack. Another reminder to shore up those defenses.

👁️‍🗨️ China Bans Facial Recognition: Consent is now required for facial recognition in China. But are there exceptions for government and AI training?

👉 Dive into the full details here: opalsec.io/daily-news-update-t

Stay vigilant, stay informed, and let's keep the digital world a little safer, one update at a time. 🛡️

  • 3
  • 0
  • 12 hours ago
Profile picture

I probably sound like a broken record at this point, but we're not sold yet on the world-ending nature of Next.js CVE-2025-29927.

The fact that the bug isn't known to have been successfully exploited in the wild despite the huge amount of media and industry attention it’s received sure feels like a reasonable early indicator that it's unlikely to be broadly exploitable (classic framework vuln), and may not have any easily identifiable remote attack vectors at all.

rapid7.com/blog/post/2025/03/2

  • 1
  • 6
  • 6 hours ago
Profile picture

: Critical in NextJS (CVE-2025-29927) impacts all NextJS versions before 15.2.3, 14.2.25, 13.5.9, 12.3.5 allowing attackers to bypass authorisation checks.

Great explanation and a Proof-of-Concept demonstration by @_JohnHammond
👇
youtube.com/watch?v=dL1a0KcAW3Y

  • 0
  • 2
  • 22 hours ago
Profile picture

📣Critical Vercel Next.js Middleware Authentication CVE-2025-29927 (CVSS 9.1/10) Vercel Next.js Middleware Authentication Bypass Vulnerability
🤢Impact: A successful exploit allows an attacker to bypass authorization checks within a Next.js application.
🛡️Fixed: v14.2.25 v15.2.3

  • 0
  • 0
  • 23 hours ago
Profile picture

🚨 Critical Next.js Vulnerability (CVE-2025-29927) Exposes Middleware to Attack! 🚨

A newly discovered security flaw in Next.js !

📖 Read the full breakdown here: wardenshield.com/cve-2025-2992

#CyberSecurity #Nextjs #CVE2025 #MiddlewareMeltdown #Infosec #WardenShield

  • 0
  • 0
  • 19 hours ago
Profile picture

Everyone’s talking about the Next.js vulnerability alert - and rightfully so. 👉 Here's why you need to detect and fix CVE-2025-29927 - now!

CVE-2025-29927 allows attackers to bypass crucial authorization checks via a simple header manipulation. This flaw affects a wide range of Next.js versions, potentially exposing sensitive data and critical admin functionalities.

Here's what you need to know:

👉 Impact: Attackers can gain unauthorized access to protected routes, leading to data breaches and privilege escalation.
👉 Vulnerable versions: Next.js 11.1.4 through 15.2.2.
👉 Detection: our Network Vulnerability Scanner now detects CVE-2025-29927, so a CVE-focused scan lets you identify vulnerable instances in your infrastructure - fast.

🔥 Don't wait for the exploit: act now

✅ Run a network scan

✅ Read the detailed write-up that explains how this vulnerability works, its impact, and detailed remediation steps ➡️ pentest-tools.com/blog/CVE-202

  • 0
  • 0
  • 11 hours ago
Profile picture

Oh, look, another critical — this time it's Next.js opening the door for any adversary that says "pretty please" via a request header. Fortunately, even though it'll be an effort to upgrade for the fix, mitigation will be simple in most cases. checkmarx.com/zero-post/critic

  • 0
  • 0
  • 2 hours ago

Overview

  • VMware Tools

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

KEV

Description

VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.

Statistics

  • 3 Posts
  • 58 Interactions

Fediverse

Profile picture

A new twist on #ESXicape - you need local admin rights to escape the VM to the hypervisor, right?

Slight issue - VMware Tools, installed inside VMs, allows local user to local admin privilege escalation on every VM due to vuln CVE-2025-22230

“A malicious actor with non-administrative privileges on a Windows guest VM may gain ability to perform certain high-privilege operations within that VM.”

Discovered by Positive Technologies, who US claim hack for Moscow.

support.broadcom.com/web/ecx/s

  • 23
  • 23
  • 5 hours ago
Profile picture

Auth bypass vuln in VMWare Tools for Windows. Nice.

support.broadcom.com/web/ecx/s

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.

nvd.nist.gov/vuln/detail/CVE-2

  • 6
  • 6
  • 6 hours ago
Profile picture

warns of authentication bypass in Windows Tools

"The vulnerability (CVE-2025-22230) is caused by an improper access control weakness and was reported by Sergey Bliznyuk of Positive Technologies (a sanctioned Russian cybersecurity company accused of trafficking hacking tools)."

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1 hour ago

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.36%

KEV

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 9 Posts
  • 21 Interactions

Fediverse

Profile picture

Critical Kubernetes alert: CVE-2025-1097 in Ingress-Nginx allows RCE and secret theft (CVSS 8.8). Over 6,500 clusters exposed. Patch now (1.12.1/1.11.5) and restrict admission controller access. Details: redteamnews.com/exploit/cve/cr -2025-1097

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes alert: CVE-2025-1097 in Ingress-Nginx allows RCE and secret theft (CVSS 8.8). Over 6,500 clusters exposed. Patch now (1.12.1/1.11.5) and restrict admission controller access. Details: redteamnews.com/exploit/cve/cr -2025-1097

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes alert: CVE-2025-1097 in Ingress-Nginx allows RCE and secret theft (CVSS 8.8). Over 6,500 clusters exposed. Patch now (1.12.1/1.11.5) and restrict admission controller access. Details: redteamnews.com/exploit/cve/cr -2025-1097

  • 0
  • 0
  • 11 hours ago
Profile picture

oh, this ingress/nginx proxy vuln family: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514

maybe we need to rewrite that component in rust? oh, wait.

  • 0
  • 1
  • 4 hours ago
Profile picture

Wow, things are getting wild in the Kubernetes world! The name alone – "IngressNightmare" – gives me chills! 🤯 It's crucial to know this affects the Ingress NGINX Controller, *not* the NGINX Ingress Controller. That's a big difference!

Wiz really uncovered something huge. We're talking over 6,500 vulnerable clusters, with the potential for some serious Remote Code Execution (RCE). Ouch! They found that a scary 43% of cloud environments are impacted.

It appears, that these kinds of vulnerabilities often slip past standard scans. You really need manual penetration testing to catch them. And as a pentester myself, I can tell you, it's frequently like digging for buried treasure! 😅

Here are the CVEs to watch out for: CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-1974. These have a CVSS score of 9.8! So, you'll want to update to 1.12.1, 1.11.5, or 1.10.7 *immediately*. Another crucial step? See if your Admission Webhook Endpoint is exposed. Make sure you're limiting access. Don't need it? Then, turn it off!

So, what are your experiences with K8s security? I'm curious, what tools do you swear by? 🤔

  • 5
  • 2
  • 16 hours ago
Profile picture

We will be performing an emergency upgrade of our cluster infrastructure to patch a series of critical security vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514) on our NGINX containers. As a result there may be a brief/intermittent disruption to Mastodon availability over the next hour. We apologize for the inconvenience, and hope you can quickly return to enjoying all the Nicole memes. Please see status.vmst.io for more information. #vmstio

  • 2
  • 4
  • 7 hours ago
Profile picture

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller.

CVE-2025-1974 but also CVE-2025-1097 CVE-2025-1098 CVE-2025-24513 CVE-2025-24514

🔗 For more details about Ingress NGINX Controller for Kubernetes release vulnerability.circl.lu/bundle/

#kubernetes #vulnerability #cybersecurity #cve

  • 1
  • 4
  • 11 hours ago
Profile picture

Security researchers reveal critical vulnerabilities in Ingress #Nginx Controller for Kubernetes

The vulnerabilities are tracked as CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974, and when exploited, allows an attacker to take over a Kubernetes cluster

Administrators are advised to patch ASAP

#cybersecurity #vulnerabilitymanagement

thehackernews.com/2025/03/crit

  • 1
  • 1
  • 22 hours ago

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.36%

KEV

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 9 Posts
  • 21 Interactions

Fediverse

Profile picture

Critical Kubernetes vulnerability CVE-2025-1098 allows RCE and secret theft via Ingress-Nginx controller. Patch now (v1.12.1/v1.11.5) and restrict admission controller access. Thousands of clusters may be exposed. Details: redteamnews.com/exploit/cve/cr -2025-1098

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes vulnerability CVE-2025-1098 allows RCE and secret theft via Ingress-Nginx controller. Patch now (v1.12.1/v1.11.5) and restrict admission controller access. Thousands of clusters may be exposed. Details: redteamnews.com/exploit/cve/cr -2025-1098

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes vulnerability CVE-2025-1098 allows RCE and secret theft via Ingress-Nginx. Patch now (v1.12.1/1.11.5) and restrict admission controller access. Thousands of clusters at risk. Details: redteamnews.com/exploit/cve/cr -2025-1098

  • 0
  • 0
  • 11 hours ago
Profile picture

oh, this ingress/nginx proxy vuln family: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514

maybe we need to rewrite that component in rust? oh, wait.

  • 0
  • 1
  • 4 hours ago
Profile picture

Wow, things are getting wild in the Kubernetes world! The name alone – "IngressNightmare" – gives me chills! 🤯 It's crucial to know this affects the Ingress NGINX Controller, *not* the NGINX Ingress Controller. That's a big difference!

Wiz really uncovered something huge. We're talking over 6,500 vulnerable clusters, with the potential for some serious Remote Code Execution (RCE). Ouch! They found that a scary 43% of cloud environments are impacted.

It appears, that these kinds of vulnerabilities often slip past standard scans. You really need manual penetration testing to catch them. And as a pentester myself, I can tell you, it's frequently like digging for buried treasure! 😅

Here are the CVEs to watch out for: CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-1974. These have a CVSS score of 9.8! So, you'll want to update to 1.12.1, 1.11.5, or 1.10.7 *immediately*. Another crucial step? See if your Admission Webhook Endpoint is exposed. Make sure you're limiting access. Don't need it? Then, turn it off!

So, what are your experiences with K8s security? I'm curious, what tools do you swear by? 🤔

  • 5
  • 2
  • 16 hours ago
Profile picture

We will be performing an emergency upgrade of our cluster infrastructure to patch a series of critical security vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514) on our NGINX containers. As a result there may be a brief/intermittent disruption to Mastodon availability over the next hour. We apologize for the inconvenience, and hope you can quickly return to enjoying all the Nicole memes. Please see status.vmst.io for more information. #vmstio

  • 2
  • 4
  • 7 hours ago
Profile picture

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller.

CVE-2025-1974 but also CVE-2025-1097 CVE-2025-1098 CVE-2025-24513 CVE-2025-24514

🔗 For more details about Ingress NGINX Controller for Kubernetes release vulnerability.circl.lu/bundle/

#kubernetes #vulnerability #cybersecurity #cve

  • 1
  • 4
  • 11 hours ago
Profile picture

Security researchers reveal critical vulnerabilities in Ingress #Nginx Controller for Kubernetes

The vulnerabilities are tracked as CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974, and when exploited, allows an attacker to take over a Kubernetes cluster

Administrators are advised to patch ASAP

#cybersecurity #vulnerabilitymanagement

thehackernews.com/2025/03/crit

  • 1
  • 1
  • 22 hours ago

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.36%

KEV

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 9 Posts
  • 21 Interactions

Fediverse

Profile picture

Critical Kubernetes alert: CVE-2025-24514 in ingress-nginx allows RCE and secret theft via annotation injection (CVSS 8.8). Over 6,500 clusters may be exposed. Patch now or disable admission webhooks. Details: redteamnews.com/exploit/cve/cr -2025-24514

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes alert: CVE-2025-24514 in ingress-nginx allows RCE & secret theft via annotation injection (CVSS 8.8). Patch now or disable admission webhooks. Over 6,500 clusters may be exposed. Details: redteamnews.com/exploit/cve/cr -2025-24514

  • 0
  • 0
  • 11 hours ago
Profile picture

Critical Kubernetes vulnerability (CVE-2025-24514) in ingress-nginx allows RCE and secret theft via annotation injection. Patch now (v1.11.5/1.12.1) and restrict webhook access. Over 6,500 clusters may be exposed. Details: redteamnews.com/exploit/cve/cr -2025-24514

  • 0
  • 0
  • 11 hours ago
Profile picture

oh, this ingress/nginx proxy vuln family: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514

maybe we need to rewrite that component in rust? oh, wait.

  • 0
  • 1
  • 4 hours ago
Profile picture

Wow, things are getting wild in the Kubernetes world! The name alone – "IngressNightmare" – gives me chills! 🤯 It's crucial to know this affects the Ingress NGINX Controller, *not* the NGINX Ingress Controller. That's a big difference!

Wiz really uncovered something huge. We're talking over 6,500 vulnerable clusters, with the potential for some serious Remote Code Execution (RCE). Ouch! They found that a scary 43% of cloud environments are impacted.

It appears, that these kinds of vulnerabilities often slip past standard scans. You really need manual penetration testing to catch them. And as a pentester myself, I can tell you, it's frequently like digging for buried treasure! 😅

Here are the CVEs to watch out for: CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-1974. These have a CVSS score of 9.8! So, you'll want to update to 1.12.1, 1.11.5, or 1.10.7 *immediately*. Another crucial step? See if your Admission Webhook Endpoint is exposed. Make sure you're limiting access. Don't need it? Then, turn it off!

So, what are your experiences with K8s security? I'm curious, what tools do you swear by? 🤔

  • 5
  • 2
  • 16 hours ago
Profile picture

We will be performing an emergency upgrade of our cluster infrastructure to patch a series of critical security vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514) on our NGINX containers. As a result there may be a brief/intermittent disruption to Mastodon availability over the next hour. We apologize for the inconvenience, and hope you can quickly return to enjoying all the Nicole memes. Please see status.vmst.io for more information. #vmstio

  • 2
  • 4
  • 7 hours ago
Profile picture

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller.

CVE-2025-1974 but also CVE-2025-1097 CVE-2025-1098 CVE-2025-24513 CVE-2025-24514

🔗 For more details about Ingress NGINX Controller for Kubernetes release vulnerability.circl.lu/bundle/

#kubernetes #vulnerability #cybersecurity #cve

  • 1
  • 4
  • 11 hours ago
Profile picture

Security researchers reveal critical vulnerabilities in Ingress #Nginx Controller for Kubernetes

The vulnerabilities are tracked as CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974, and when exploited, allows an attacker to take over a Kubernetes cluster

Administrators are advised to patch ASAP

#cybersecurity #vulnerabilitymanagement

thehackernews.com/2025/03/crit

  • 1
  • 1
  • 22 hours ago

Overview

  • Google
  • Chrome

19 Mar 2025
Published
24 Mar 2025
Updated

CVSS
Pending
EPSS
0.46%

KEV

Description

Use after free in Lens in Google Chrome prior to 134.0.6998.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

Statistics

  • 2 Posts
  • 4 Interactions

Fediverse

Profile picture

walknews.com/839397/ Google Chromeの重大な脆弱性が修正、早急なアップデートを(CVE-2025-2476)|セキュリティニュース #Science #Science&Technology #Technology #テクノロジー #科学 #科学&テクノロジー

  • 3
  • 0
  • 20 hours ago
Profile picture

wacoca.com/news/2481285/ Google Chromeの重大な脆弱性が修正、早急なアップデートを(CVE-2025-2476)|セキュリティニュース #Science&Technology #ScienceNews #TechnologyNews #テクノロジー #科学 #科学&テクノロジー

  • 1
  • 0
  • 4 hours ago

Overview

  • Pending

20 Jul 2023
Published
15 Oct 2024
Updated

CVSS
Pending
EPSS
45.31%

KEV

Description

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

Statistics

  • 1 Post
  • 4 Interactions

Fediverse

Profile picture

Uh, is it normal for an automated #security scanner to be unaware of #debian patched packages?

Like how OpenSSH 9.2p1 is vulnerable to CVE-2023-38408 but the Debian version 1:9.2p1-2+deb12u5 is patched. But the security scanner sees the "9.2p1" string and sounds the alarm.

security-tracker.debian.org/tr

Is this a common problem for people running Debian servers?

  • 3
  • 1
  • 2 hours ago

Overview

  • nasa
  • CryptoLib

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
Pending

KEV

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a Heap Overflow vulnerability occurs in the `Crypto_TM_ProcessSecurity` function (`crypto_tm.c:1735:8`). When processing the Secondary Header Length of a TM protocol packet, if the Secondary Header Length exceeds the packet's total length, a heap overflow is triggered during the memcpy operation that copies packet data into the dynamically allocated buffer `p_new_dec_frame`. This allows an attacker to overwrite adjacent heap memory, potentially leading to arbitrary code execution or system instability. A patch is available at commit 810fd66d592c883125272fef123c3240db2f170f.

Statistics

  • 1 Post
  • 4 Interactions

Fediverse

Profile picture

Moar hacking in space!

github.com/nasa/CryptoLib/secu

sec:CRIT 9.4 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a Heap Overflow vulnerability occurs in the Crypto_TM_ProcessSecurity function (crypto_tm.c:1735:8). When processing the Secondary Header Length of a TM protocol packet, if the Secondary Header Length exceeds the packet's total length, a heap overflow is triggered during the memcpy operation that copies packet data into the dynamically allocated buffer p_new_dec_frame. This allows an attacker to overwrite adjacent heap memory, potentially leading to arbitrary code execution or system instability. A patch is available at commit 810fd66d592c883125272fef123c3240db2f170f.

nvd.nist.gov/vuln/detail/CVE-2

  • 2
  • 2
  • 1 hour ago

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
25 Mar 2025
Updated

CVSS v3.1
MEDIUM (4.8)
EPSS
0.17%

KEV

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where attacker-provided data are included in a filename by the ingress-nginx Admission Controller feature, resulting in directory traversal within the container. This could result in denial of service, or when combined with other vulnerabilities, limited disclosure of Secret objects from the cluster.

Statistics

  • 5 Posts
  • 20 Interactions

Fediverse

Profile picture

Wow, things are getting wild in the Kubernetes world! The name alone – "IngressNightmare" – gives me chills! 🤯 It's crucial to know this affects the Ingress NGINX Controller, *not* the NGINX Ingress Controller. That's a big difference!

Wiz really uncovered something huge. We're talking over 6,500 vulnerable clusters, with the potential for some serious Remote Code Execution (RCE). Ouch! They found that a scary 43% of cloud environments are impacted.

It appears, that these kinds of vulnerabilities often slip past standard scans. You really need manual penetration testing to catch them. And as a pentester myself, I can tell you, it's frequently like digging for buried treasure! 😅

Here are the CVEs to watch out for: CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-1974. These have a CVSS score of 9.8! So, you'll want to update to 1.12.1, 1.11.5, or 1.10.7 *immediately*. Another crucial step? See if your Admission Webhook Endpoint is exposed. Make sure you're limiting access. Don't need it? Then, turn it off!

So, what are your experiences with K8s security? I'm curious, what tools do you swear by? 🤔

  • 5
  • 2
  • 16 hours ago
Profile picture

We will be performing an emergency upgrade of our cluster infrastructure to patch a series of critical security vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514) on our NGINX containers. As a result there may be a brief/intermittent disruption to Mastodon availability over the next hour. We apologize for the inconvenience, and hope you can quickly return to enjoying all the Nicole memes. Please see status.vmst.io for more information. #vmstio

  • 2
  • 4
  • 7 hours ago
Profile picture

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller.

CVE-2025-1974 but also CVE-2025-1097 CVE-2025-1098 CVE-2025-24513 CVE-2025-24514

🔗 For more details about Ingress NGINX Controller for Kubernetes release vulnerability.circl.lu/bundle/

#kubernetes #vulnerability #cybersecurity #cve

  • 1
  • 4
  • 11 hours ago
Profile picture

Security researchers reveal critical vulnerabilities in Ingress #Nginx Controller for Kubernetes

The vulnerabilities are tracked as CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974, and when exploited, allows an attacker to take over a Kubernetes cluster

Administrators are advised to patch ASAP

#cybersecurity #vulnerabilitymanagement

thehackernews.com/2025/03/crit

  • 1
  • 1
  • 22 hours ago
Showing 1 to 10 of 74 CVEs