CVE-2021-25736Process Control in Kubernetes

Severity
6.3MEDIUMNVD
CNA5.8
EPSS
0.1%
top 76.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateAug 21

Description

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 1.8 | Impact: 4.0

Affected Packages3 packages

Gok8s.io/kubernetes< 1.21+1
NVDkubernetes/kubernetes1.18.01.18.18+2
CVEListV5kubernetes/kubernetesv1.20.5

🔴Vulnerability Details

4
OSV
Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes2024-08-21
GHSA
Kube-proxy may unintentionally forward traffic2023-10-30
CVEList
Windows kube-proxy LoadBalancer contention2023-10-30
OSV
Kube-proxy may unintentionally forward traffic2023-10-30

📋Vendor Advisories

2
Red Hat
kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM2021-05-10
Debian
CVE-2021-25736: kubernetes - Kube-proxy on Windows can unintentionally forward traffic to local processes l...2021
CVE-2021-25736 — Process Control in K8s.io Kubernetes | cvebase