Join us
A new Kubernetes vulnerability affecting the ingress-nginx controller, CVE-2024-7646, allows malicious actors to bypass annotation validation and potentially gain unauthorized access to sensitive cluster resources. The vulnerability has a CVSS v3.1 base score of 8.8 (High), indicating the potential for significant impact on confidentiality, integrity, and availability of affected systems. It is crucial to upgrade to ingress-nginx controller v1.11.2 or later, audit existing Ingress objects for suspicious annotations, limit who can create and modify Ingress objects, enable Kubernetes audit logging, and implement `ValidatingAdmissionWebhooks` to enforce stricter validation.
Join other developers and claim your FAUN account now!
Only registered users can post comments. Please, login or signup.