Improper Certificate Validation Affecting kubernetesclient package, versions [,17.0.14)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-KUBERNETESCLIENT-12818381
  • published18 Sept 2025
  • disclosed16 Sept 2025
  • creditElliott Beach

Introduced: 16 Sep 2025

NewCVE-2025-9708  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade KubernetesClient to version 17.0.14 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation via a flaw in the certificate validation logic, which accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. An attacker can use this to intercept or manipulate communications, leading to man-in-the-middle attacks and API impersonation.

Workaround

Mitigate the risk by moving the custom CA certificates into the system's trust store, rather than keeping them in the kubeconfig file. This forces the system to perform proper trust chain validation. Alternatively, consider disabling certificate-based authentication temporarily, if feasible.

CVSS Base Scores

version 4.0
version 3.1