Kubernetes Misconfiguration

Vulnerability Details

Severity:

High

Category:

Cloud

Description

The Kubernetes cluster contains security misconfigurations such as exposed dashboard without authentication, overly permissive RBAC policies, or insecure pod security settings.

Risks

An attacker could gain unauthorized access to the cluster, deploy malicious workloads, access secrets, move laterally between namespaces, or compromise the entire container orchestration infrastructure.

Remediation

Enable and enforce RBAC with least-privilege policies. Restrict dashboard access and require authentication. Implement Pod Security Standards. Use network policies to restrict pod-to-pod communication. Enable audit logging and monitoring.