
Cloud Vulnerability DB
A community-led vulnerabilities database
KubeView through version 0.1.31 contains a critical authentication bypass vulnerability (CVE-2022-45933) discovered in November 2022. The vulnerability allows attackers to obtain control of a Kubernetes cluster by accessing the api/scrape/kube-system endpoint without authentication, which exposes certificate files that can be used for authentication as kube-admin. The vendor has acknowledged that KubeView was intended as a "fun side project and a learning exercise" and was not designed to be "very secure" (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue stems from a missing authentication mechanism for the api/scrape/kube-system endpoint, which exposes sensitive certificate files. These certificates can then be used to authenticate as kube-admin, effectively granting full cluster access (NVD).
The exploitation of this vulnerability allows attackers to gain complete control over the Kubernetes cluster. By accessing the exposed certificate files, an attacker can authenticate as kube-admin and perform any administrative action within the cluster (GitHub Issue).
No official patches or fixes have been released as the vendor has indicated that KubeView was a learning exercise and not intended for production use. Organizations using KubeView should immediately discontinue its use and implement proper authentication mechanisms for their Kubernetes management tools (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."