About
The Kubernetes dashboard can be used to manage cluster configuration. Exposing this without authentication allows attackers to modify the configuration of the cluster.
Understanding Impact
Business Impact
Unauthenticated access to the Kubernetes dashboard can leak sensitive business information and allow attackers to compromise business applications running in the affected cluster.
Technical Impact
Exposing the Kubernetes dashboard without authentication can allow attackers to gain access to information about the cluster or modify its configuration, depending on the credentials provided to the Dashboard.
Identify affected resources
Review the kubernetes-dashboard
deployment to confirm that the --enable-skip-login
parameter has not been added to it.
Remediate vulnerable resources
Remove the --enable-skip-login
parameter from the Kubernetes dashboard deployment.
References
Tesla cloud resources are hacked to run cryptocurrency mining malware
arstechnica.com