CVE 2025 1974

Kubernetes’ Ingress-NGINX Nightmare — CVE-2025-1974: Patch Now or Risk Exposure!

CVE-2025-1974 is a critical security vulnerability identified in Kubernetes’ ingress-nginx controller. Under certain conditions, an unauthenticated attacker with access to the pod network can execute arbitrary code within the ingress-nginx controller’s context. This exploitation may lead to the disclosure of secrets accessible to the controller, which, in default installations, includes all cluster-wide secrets.

Affected Kubernetes Versions:

  • Versions prior to v1.11.0
  • Versions v1.11.0 through v1.11.4
  • Version v1.12.0

To address this vulnerability, it is imperative to upgrade the ingress-nginx controller to one of the following patched versions:

  • v1.11.5
  • v1.12.1

Vulnerability Mitigation Steps:

  1. Upgrade Ingress-NGINX Controller: Implement the latest patched versions (v1.11.5 or v1.12.1) to remediate the vulnerability.
  2. Disable the Validating Admission Controller: If immediate upgrading isn’t feasible, temporarily disable the Validating Admission Controller feature of ingress-nginx to mitigate risk.
controller.admissionWebhooks.enabled=false.

For manual installations:

  • Delete the ValidatingWebhookConfiguration named ingress-nginx-admission.
  • Edit the ingress-nginx-controller Deployment or DaemonSet to remove the --validating-webhook argument from the controller container’s argument list.

Verification: To determine if your cluster utilizes ingress-nginx, execute:

kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx

Given the severity of CVE-2025-1974, with a CVSS score of 9.8 (Critical), prompt action is essential to safeguard your Kubernetes clusters from potential exploitation.

Additional Details of CVE-2025-1974:

As of March 25, 2025, there is no evidence to suggest that CVE-2025-1974 has been actively exploited in the wild. However, a proof-of-concept (PoC) exploit has been made publicly available, indicating that the vulnerability is exploitable under certain conditions. Given the critical nature of this vulnerability and the availability of a PoC, it is imperative to take immediate action to secure your systems.

Key Take Aways

kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx
  1. Critical security risk: It is strongly recommended to immediately update your ingress-nginx installation to version v1.11.5 or v1.12.1 to protect your Kubernetes environment.
  2. Immediate mitigation required: If immediate patching is not achievable within your environment, temporarily disable the “Validating Admission Controller” as an interim measure and execute an upgrade as soon as possible.

Dashboard1170

Take a Product Tour

  • Get Full Visibility
  • Focus on What Matters
  • Mitigate Risk at Scale
Take a Tour

Take the OX challenge

Shrink security debt by 95% in less than 90 minutes