FKIE_CVE-2025-46599
Vulnerability from fkie_nvd - Published: 2025-04-25 05:15 - Updated: 2025-04-29 13:52
Severity ?
Summary
CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials."
},
{
"lang": "es",
"value": "CNCF K3s 1.32 anterior a 1.32.4-rc1+k3s1 tiene un cambio de configuraci\u00f3n de kubelet de Kubernetes con la consecuencia no deseada de que, en algunas situaciones, ReadOnlyPort se establece en 10255. Por ejemplo, el comportamiento predeterminado de una instalaci\u00f3n en l\u00ednea de K3s podr\u00eda permitir el acceso no autenticado a este puerto, exponiendo las credenciales."
}
],
"id": "CVE-2025-46599",
"lastModified": "2025-04-29T13:52:28.490",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4.0,
"source": "cve@mitre.org",
"type": "Secondary"
}
]
},
"published": "2025-04-25T05:15:33.330",
"references": [
{
"source": "cve@mitre.org",
"url": "https://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/f1veT/BUG/issues/2"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/k3s-io/k3s/commit/097b63e588e3c844cdf9b967bcd0a69f4fc0aa0a"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/k3s-io/k3s/compare/v1.32.3+k3s1...v1.32.4-rc1+k3s1"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/k3s-io/k3s/issues/12164"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…