Metrics
Affected Vendors & Products
Solution
Deploy the patch version of the Kubernetes C# client as soon as possible. Alternatively, move the CA certificates into the system trust store instead of specifying them in the kubeconfig file. Note: This approach may introduce new risks, as all processes on the system will begin to trust certificates signed by that CA. If you must use an affected version, you can disable custom CA and add the CA to the machine's trusted root.
Workaround
No workaround given by the vendor.
Tue, 16 Sep 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exists in the Kubernetes C# client where the certificate validation logic accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This flaw allows a malicious actor to present a forged certificate and potentially intercept or manipulate communication with the Kubernetes API server, leading to possible man-in-the-middle attacks and API impersonation. | |
Title | Kubernetes C# Client: improper certificate validation in custom CA mode may lead to man-in-the-middle attacks | |
Weaknesses | CWE-295 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2025-09-16T21:08:05.189Z
Reserved: 2025-08-29T16:21:58.881Z
Link: CVE-2025-9708

No data.

Status : Received
Published: 2025-09-16T22:15:33.407
Modified: 2025-09-16T22:15:33.407
Link: CVE-2025-9708

No data.

No data.