6.3
CVSSv3

CVE-2021-25736

Published: 30/10/2023 Updated: 21/12/2023
CVSS v3 Base Score: 6.3 | Impact Score: 4 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes kubernetes

Vendor Advisories

A flaw was found in the Windows kube-proxy component In a cloud environment that does not set the “statusloadBalanceringressip” field in the LoadBalancer service status configuration (for example in AWS) the packets can be misrouted and reach an unintended destination ...