A vulnerability exists in the Kubernetes C# client where the certificate validation logic accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This flaw allows a malicious actor to present a forged certificate and potentially intercept or manipulate communication with the Kubernetes API server, leading to possible man-in-the-middle attacks and API impersonation.
Metrics
Affected Vendors & Products
References
History
Tue, 16 Sep 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exists in the Kubernetes C# client where the certificate validation logic accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This flaw allows a malicious actor to present a forged certificate and potentially intercept or manipulate communication with the Kubernetes API server, leading to possible man-in-the-middle attacks and API impersonation. | |
Title | Kubernetes C# Client: improper certificate validation in custom CA mode may lead to man-in-the-middle attacks | |
Weaknesses | CWE-295 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: kubernetes
Published: 2025-09-16T21:08:05.189Z
Updated: 2025-09-16T21:08:05.189Z
Reserved: 2025-08-29T16:21:58.881Z
Link: CVE-2025-9708

No data.

Status : Received
Published: 2025-09-16T22:15:33.407
Modified: 2025-09-16T22:15:33.407
Link: CVE-2025-9708

No data.