Unauthenticated access to exposed Kubernetes dashboard

PLATFORM

SERVICE

kubernetes

DATA BREACHES

known

LAST UPDATED

EXPLOITABILITY Exploitability of a vulnerability measures how easy it is for an attacker to discover and exploit the vulnerability, some might refer to this as likelihood.

IMPACT How impactful to your environment and organization a successful exploitation of this vulnerability is expected to be.

high

medium

About

The Kubernetes dashboard can be used to manage cluster configuration. Exposing this without authentication allows attackers to modify the configuration of the cluster.

Understanding Impact

Business Impact

Unauthenticated access to the Kubernetes dashboard can leak sensitive business information and allow attackers to compromise business applications running in the affected cluster.

Technical Impact

Exposing the Kubernetes dashboard without authentication can allow attackers to gain access to information about the cluster or modify its configuration, depending on the credentials provided to the Dashboard.

Identify affected resources

Review the kubernetes-dashboard deployment to confirm that the --enable-skip-login parameter has not been added to it.

Remediate vulnerable resources

Remove the --enable-skip-login parameter from the Kubernetes dashboard deployment.

References

Tesla cloud resources are hacked to run cryptocurrency mining malware

arstechnica.com

Did you find this article helpful?