Untriaged
Permalink
CVE-2026-32254
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
Kube-router Proxy Module Blindly Trusts ExternalIPs/LoadBalancer IPs Enabling Cluster-Wide Traffic Hijacking and DNS DoS
Kube-router is a turnkey solution for Kubernetes networking. Prior to version 2.8.0, Kube-router's proxy module does not validate externalIPs or loadBalancer IPs before programming them into the node's network configuration. Version 2.8.0 contains a patch for the issue. Available workarounds include enabling DenyServiceExternalIPs feature gate, deploying admission policy, restricting service creation RBAC, monitoring service changes, and applying BGP prefix filtering.
References
- https://github.com/cloudnativelabs/kube-router/security/advisories/GHSA-phqm-jgc3-qf8g x_refsource_CONFIRM
- https://github.com/cloudnativelabs/kube-router/commit/a1f0b2eea3ee0f66b9a5b5c49dcb714619ccd456 x_refsource_MISC
- https://github.com/cloudnativelabs/kube-router/releases/tag/v2.8.0 x_refsource_MISC
- https://github.com/cloudnativelabs/kube-router/security/advisories/GHSA-phqm-jg… exploit
Affected products
kube-router
- ==< 2.8.0
Package maintainers
-
@johanot Johan Thomsen <write@ownrisk.dk>