CVE-2024-31989
Argo CD vulnerability analysis and mitigation

Overview

CVE-2024-31989 affects Argo CD, a declarative GitOps continuous delivery tool for Kubernetes. The vulnerability was discovered in May 2024 and involves an unprivileged pod in a different namespace on the same cluster being able to connect to the Redis server on port 6379. Despite having the latest version of the VPC CNI plugin installed on EKS clusters, manual configuration is required to enforce network policies, potentially leaving many clients with unprotected Redis servers. The vulnerability affects all versions until 2.11.0, 2.10.9, 2.9.14, and 2.8.18, with patches available in versions 2.11.1, 2.10.10, 2.9.15, and 2.8.19 (GitHub Advisory).

Technical details

The vulnerability stems from the Redis database server not being password-protected by default. The issue allows attackers to modify the 'mfst' (manifest) key in Redis, potentially causing Argo CD to execute arbitrary deployments. The vulnerability exploits the fact that while cache entries are protected by a 'cacheEntryHash', this hash doesn't use a private key for signing, making it possible to generate new FNV64a hashes matching modified manifest values. The CVSS score is 9.1 (Critical), with the vector string CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H (GitHub Advisory).

Impact

The vulnerability can lead to two major security impacts: 1) Privilege Escalation to cluster controller level, allowing attackers to take complete control over the Kubernetes cluster, and 2) Information Leakage through manipulation of the 'app|resources-tree' key, enabling unauthorized access to sensitive Kubernetes resources. This affects any organization that doesn't have strict access controls on their Redis instance (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Argo CD versions 2.11.1, 2.10.10, 2.9.15, and 2.8.19. Organizations should upgrade to these patched versions immediately. Additionally, it's recommended to enable network policy enforcement through proper configuration of the VPC CNI plugin and implement strict access controls on the Redis instance. The Redis password is stored in Kubernetes secret 'argocd-redis' with key 'auth' in the namespace where Argo CD is installed (NVD).

Additional resources


SourceThis report was generated using AI

Related Argo CD vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55190CRITICAL9.9
  • Argo CDArgo CD
  • argocd-image-updater
NoYesSep 04, 2025
CVE-2024-21662CRITICAL9.1
  • Argo CDArgo CD
  • argo-cd-fips-2.9
NoYesMar 18, 2024
CVE-2024-31989CRITICAL9
  • Argo CDArgo CD
  • cpe:2.3:a:linuxfoundation:argo-cd
NoYesMay 21, 2024
CVE-2025-23216MEDIUM6.8
  • Argo CDArgo CD
  • argocd-image-updater
NoYesJan 30, 2025
CVE-2025-47933MEDIUM5.4
  • Argo CDArgo CD
  • github.com/argoproj/argo-cd
NoYesMay 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management