
Cloud Vulnerability DB
A community-led vulnerabilities database
The Kubernetes API server component was found to be vulnerable to a denial of service attack via successful API requests. This vulnerability, identified as CVE-2020-8552, affects versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 (NVD, Kubernetes Issue).
The vulnerability has been assigned a CVSS v3.0 score of 5.3 (Medium) with the vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The issue allows remote attackers to cause a denial of service through authorized API requests that can lead to out-of-memory conditions in the API server (Kubernetes Issue).
When successfully exploited, this vulnerability can lead to a denial of service condition in the Kubernetes API server. The attack primarily affects the availability of the service, with no direct impact on confidentiality or integrity (NetApp Advisory).
Prior to upgrading, the vulnerability can be mitigated by preventing unauthenticated or unauthorized access to all APIs. The API server should auto-restart if it experiences an out-of-memory condition. Fixed versions include v1.17.3, v1.16.7, and v1.15.10 (Kubernetes Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."