First published: Fri Apr 25 2025(Updated: )
CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/k3s-io/k3s | >=1.32.0-rc1<1.32.4-rc1 | 1.32.4-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-864f-7xjm-2jp2 is classified as a high severity vulnerability due to potential unauthorized access to sensitive data.
To mitigate GHSA-864f-7xjm-2jp2, upgrade K3s to version 1.32.4-rc1 or later.
GHSA-864f-7xjm-2jp2 affects K3s versions prior to 1.32.4-rc1.
The impacts of GHSA-864f-7xjm-2jp2 include possible unauthenticated access to the ReadOnlyPort, leading to credential exposure.
A recommended temporary workaround for GHSA-864f-7xjm-2jp2 is to configure the kubelet's ReadOnlyPort to be disabled.