The blog outlines several critical unauthenticated Remote Code Execution vulnerabilities found in Ingress NGINX Controller for Kubernetes, collectively dubbed #IngressNightmare. These vulnerabilities can grant attackers unauthorized access to all secrets within a Kubernetes cluster, risking complete takeover. With a CVSS v3.1 score of 9.8, it is estimated that 43% of cloud environments, including many Fortune 500 companies, are at risk. Patching is highly recommended. Affected: Kubernetes, Ingress NGINX Controller
Keypoints :
- Discovery of CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974 vulnerabilities.
- These vulnerabilities allow unauthorized access to secret data and potential cluster takeover.
- Approximately 43% of cloud environments are vulnerable, impacting many public-facing Kubernetes clusters.
- Ingress NGINX Controller is widely used and is crucial for routing external traffic to Kubernetes services.
- Vulnerabilities arise from the admission controller’s accessibility and the configuration validation process.
- Patching is advised with specific recommended versions to mitigate risks.
- Research findings are shared to strengthen overall cloud security practices.
Full Story: https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities