CVE-2025-9708
C# vulnerability analysis and mitigation

Overview

A medium-severity vulnerability (CVE-2025-9708) was discovered in the Kubernetes C# client, affecting all versions prior to v17.0.14. The vulnerability exists in the certificate validation logic where the client accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This security flaw was disclosed on September 16, 2025, and received a CVSS score of 6.8 (Medium) (NVD, Security Online).

Technical details

The vulnerability stems from improper certificate validation (CWE-295) in custom CA mode. When the Kubernetes C# client connects to a Kubernetes API server over TLS/HTTPS with custom CA certificates in the kubeconfig file, it fails to properly verify the trust chain of presented certificates. The vulnerability has been assigned a CVSS v3.1 score of 6.8 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N, indicating network accessibility with high attack complexity, no privileges required, and user interaction required (Kubernetes Issue).

Impact

The vulnerability enables malicious actors to present forged certificates that could be accepted as valid by the client. This can lead to man-in-the-middle (MITM) attacks where attackers can intercept or manipulate communication with the Kubernetes API server. Additionally, it enables API server impersonation, allowing unauthorized access to sensitive data and potential manipulation of cluster operations. The risk is particularly significant for organizations operating Kubernetes clusters over untrusted networks (Kubernetes Announce).

Mitigation and workarounds

The primary mitigation is to upgrade to Kubernetes C# client version 17.0.14 or later. For organizations unable to update immediately, alternative mitigations include moving CA certificates into the system trust store instead of specifying them in the kubeconfig file, though this may introduce new risks as all processes on the system will trust certificates signed by that CA. Organizations can also disable custom CA and add the CA to the machine's trusted root store (Kubernetes Issue).

Community reactions

The vulnerability was reported by @elliott-beach and addressed by a team including Boshi Lian (@tg123), Brendan Burns (@brendandburns), and Rita Zhang (@ritazh). The Kubernetes Security Response Committee coordinated the disclosure and patching process (Kubernetes Issue).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64095CRITICAL9.8
  • C#C#
  • DNN.PLATFORM
NoYesOct 28, 2025
CVE-2025-61413MEDIUM6.1
  • C#C#
  • Piranha
NoNoOct 23, 2025
CVE-2025-62594MEDIUM5.5
  • C#C#
  • Magick.NET-Q8-OpenMP-arm64
NoYesOct 27, 2025
CVE-2025-64094MEDIUM5.4
  • C#C#
  • DotNetNuke.Core
NoYesOct 28, 2025
CVE-2025-62802MEDIUM4.3
  • C#C#
  • Dnn.Platform
NoYesOct 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management