CVE-2026-24514

6.5 MEDIUM

📋 TL;DR

This CVE describes a denial-of-service vulnerability in ingress-nginx's validating admission controller. Attackers can send large requests to exhaust memory, potentially causing the controller pod to be killed or the node to run out of memory. This affects Kubernetes clusters using ingress-nginx with the validating admission controller enabled.

💻 Affected Systems

Products:
  • ingress-nginx
Versions: Specific versions not specified in provided information, but likely affects multiple versions prior to fix
Operating Systems: All platforms running ingress-nginx
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with validating admission controller enabled. The vulnerability is in the admission webhook component.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for ingress-nginx controller, potentially affecting all ingress traffic to applications, and possible node-level resource exhaustion impacting other workloads on the same node.

🟠

Likely Case

Temporary disruption of ingress-nginx controller pod, causing brief interruption to ingress traffic until Kubernetes restarts the pod.

🟢

If Mitigated

Minimal impact with proper resource limits, monitoring, and request size restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to send requests to the validating admission controller endpoint, which typically requires some level of access to the Kubernetes cluster or network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check upstream Kubernetes and ingress-nginx releases for specific version

Vendor Advisory: https://github.com/kubernetes/kubernetes/issues/136680

Restart Required: Yes

Instructions:

1. Update ingress-nginx to patched version. 2. Update Kubernetes if vulnerability is in upstream component. 3. Restart ingress-nginx controller pods.

🔧 Temporary Workarounds

Disable validating admission controller

all

Temporarily disable the vulnerable component if not required

kubectl edit deployment ingress-nginx-controller -n ingress-nginx
Remove or disable validating admission webhook configuration

Implement request size limits

all

Configure ingress-nginx to reject overly large requests

Add client_max_body_size directive in nginx configuration

🧯 If You Can't Patch

  • Implement strict network policies to restrict access to admission controller endpoints
  • Configure resource limits and requests for ingress-nginx pods to prevent node exhaustion

🔍 How to Verify

Check if Vulnerable:

Check if validating admission controller is enabled and review ingress-nginx version against patched releases

Check Version:

kubectl describe pod -n ingress-nginx | grep Image

Verify Fix Applied:

Verify ingress-nginx version is updated and test with large requests to admission endpoint

📡 Detection & Monitoring

Log Indicators:

  • High memory usage alerts for ingress-nginx pods
  • Pod restart events for ingress-nginx controller
  • Large request size logs in nginx access logs

Network Indicators:

  • Unusually large requests to admission webhook endpoints
  • High volume of requests to /validate path

SIEM Query:

source="kubernetes" pod="ingress-nginx*" (memory_usage>90% OR restart_count>2)

🔗 References

📤 Share & Export