Information Exposure Affecting kubernetes/kubernetes/pkg/proxy/winkernel package, versions <1.18.18>=1.19.0-alpha.0 <1.19.10>=1.20.0-alpha.0 <1.20.6>=1.21.0-alpha.0 <1.21.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-KUBERNETESKUBERNETESPKGPROXYWINKERNEL-6038592
  • published31 Oct 2023
  • disclosed30 Oct 2023
  • creditEric Paris, Christian Hernandez

Introduced: 30 Oct 2023

CVE-2021-25736  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade kubernetes/kubernetes/pkg/proxy/winkernel to version 1.18.18, 1.19.10, 1.20.6, 1.21.0 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure where a process on a Node may be able to accept traffic intended for a LoadBalancer Service. An attacker can forward traffic to local processes listening on the same port (spec.ports[*].port) as a LoadBalancer Service when the LoadBalancer controller does not set the status.loadBalancer.ingress[].ip field.

CVSS Scores

version 3.1