Three New High-Severity Vulnerabilities in runc: What You Need to Know
Within 24 hours, three new high-severity vulnerabilities were disclosed in runc, the low-level runtime that...
Jun 30, 2022
Check your Kubernetes clusters are properly configured to withstand unauthorized external access attempts with Kubescape
Recent research by Cyble showed that over 900,000 Kubernetes clusters were found exposed to the internet to potentially malicious scans. Some of them are susceptible to known vulnerabilities exploitations.
The research found two main elements that were exposed–
– Kubernetes control plane (also called API server) – The interface to control cluster
– Worker nodes (also called Kubelet) – The interface to nodes
Even though Kubernetes deployments best practices recommend isolating access to KubeAPI servers with bastion hosts, many of them remain openly exposed to the internet, as the research shows.
Kubernetes control plane and/or worker nodes are left exposed to the public internet by default in many cases, especially in managed Kubernetes environments.
You can use Kubescape to test if your control plane is protected by authentication and access control –
Also, Use Kubescape to test the general security hygiene of your clusters
Within 24 hours, three new high-severity vulnerabilities were disclosed in runc, the low-level runtime that...
These days it seems everyone is obsessed with MCP servers, me included. After studying the...
Kubernetes v1.34 is coming soon, and it brings a rich batch of security upgrades –...