CVE-2025-26492

7.7 HIGH

📋 TL;DR

This vulnerability in JetBrains TeamCity allows attackers to access sensitive Kubernetes resources due to improper connection settings. Organizations using TeamCity with Kubernetes integration are affected. The exposure occurs when TeamCity improperly handles Kubernetes connection configurations.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.12.2
Operating Systems: All platforms running TeamCity
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects TeamCity instances configured to use Kubernetes integration features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized access to Kubernetes clusters, potentially compromising containerized applications, stealing sensitive data, or deploying malicious workloads.

🟠

Likely Case

Unauthorized access to Kubernetes resources leading to data exposure, configuration tampering, or privilege escalation within the Kubernetes environment.

🟢

If Mitigated

Limited impact with proper network segmentation, Kubernetes RBAC controls, and restricted TeamCity permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to TeamCity and knowledge of Kubernetes configuration. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.12.2 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: No

Instructions:

1. Backup TeamCity configuration and data. 2. Download TeamCity 2024.12.2 or later from JetBrains website. 3. Follow JetBrains upgrade documentation for your deployment method. 4. Verify Kubernetes connections are properly configured post-upgrade.

🔧 Temporary Workarounds

Disable Kubernetes Integration

all

Temporarily disable TeamCity's Kubernetes integration features until patching is possible.

Navigate to TeamCity Administration > Integrations > Kubernetes and disable all connections

Restrict Kubernetes RBAC

kubernetes

Apply strict Kubernetes Role-Based Access Control to limit TeamCity service account permissions.

kubectl apply -f restricted-rbac.yaml

🧯 If You Can't Patch

  • Implement strict network segmentation between TeamCity servers and Kubernetes clusters
  • Apply least-privilege Kubernetes service accounts and audit existing permissions

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration > Server Administration > Server Health. If version is below 2024.12.2 and Kubernetes integration is enabled, the system is vulnerable.

Check Version:

Check TeamCity web interface or server logs for version information

Verify Fix Applied:

Verify TeamCity version is 2024.12.2 or higher and test Kubernetes connections to ensure proper authentication and authorization.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized Kubernetes API calls from TeamCity IPs
  • Failed authentication attempts to Kubernetes clusters
  • Unusual TeamCity configuration changes

Network Indicators:

  • Unexpected traffic from TeamCity to Kubernetes API endpoints
  • Unusual Kubernetes resource creation/modification patterns

SIEM Query:

source="teamcity" AND (kubernetes OR k8s) AND (error OR failed OR unauthorized)

🔗 References

📤 Share & Export