vulnerability
Red Hat OpenShift: CVE-2021-25736: kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:M/C:C/I:N/A:N) | Jun 24, 2021 | Jun 24, 2021 | Aug 11, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:M/C:C/I:N/A:N)
Published
Jun 24, 2021
Added
Jun 24, 2021
Modified
Aug 11, 2025
Description
Kube-proxy
on Windows can unintentionally forward traffic to local processes
listening on the same port (“spec.ports[*].port”) as a LoadBalancer
Service when the LoadBalancer controller
does not set the “status.loadBalancer.ingress[].ip” field. Clusters
where the LoadBalancer controller sets the
“status.loadBalancer.ingress[].ip” field are unaffected.
Solution
linuxrpm-upgrade-openshift4-wincw-windows-machine-config-rhel8-operator
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.