CVE-2020-8551 — Memory Allocation with Excessive Size Value in Kubernetes
Severity
6.5MEDIUMNVD
CNA4.3
EPSS
0.6%
top 30.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 27
Latest updateAug 21
Description
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Fedora 32
Patches
🔴Vulnerability Details
5OSV▶
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes↗2024-08-21
OSV▶
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes↗2022-02-15
GHSA▶
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes↗2022-02-15