Kubernetes C# client accepts certificates from any CA without properly verifying the trust chain
Moderate severity
GitHub Reviewed
Published
Sep 17, 2025
to the GitHub Advisory Database
•
Updated Sep 17, 2025
Description
Published by the National Vulnerability Database
Sep 16, 2025
Published to the GitHub Advisory Database
Sep 17, 2025
Reviewed
Sep 17, 2025
Last updated
Sep 17, 2025
A vulnerability exists in the Kubernetes C# client where the certificate validation logic accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This flaw allows a malicious actor to present a forged certificate and potentially intercept or manipulate communication with the Kubernetes API server, leading to possible man-in-the-middle attacks and API impersonation.
References