fkie_cve-2025-46599
Vulnerability from fkie_nvd
Published
2025-04-25 05:15
Modified
2025-04-29 13:52
Severity ?
Summary
CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials." }, { "lang": "es", "value": "CNCF K3s 1.32 anterior a 1.32.4-rc1+k3s1 tiene un cambio de configuraci\u00f3n de kubelet de Kubernetes con la consecuencia no deseada de que, en algunas situaciones, ReadOnlyPort se establece en 10255. Por ejemplo, el comportamiento predeterminado de una instalaci\u00f3n en l\u00ednea de K3s podr\u00eda permitir el acceso no autenticado a este puerto, exponiendo las credenciales." } ], "id": "CVE-2025-46599", "lastModified": "2025-04-29T13:52:28.490", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.0, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2025-04-25T05:15:33.330", "references": [ { "source": "cve@mitre.org", "url": "https://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port" }, { "source": "cve@mitre.org", "url": "https://github.com/f1veT/BUG/issues/2" }, { "source": "cve@mitre.org", "url": "https://github.com/k3s-io/k3s/commit/097b63e588e3c844cdf9b967bcd0a69f4fc0aa0a" }, { "source": "cve@mitre.org", "url": "https://github.com/k3s-io/k3s/compare/v1.32.3+k3s1...v1.32.4-rc1+k3s1" }, { "source": "cve@mitre.org", "url": "https://github.com/k3s-io/k3s/issues/12164" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "cve@mitre.org", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…