Impact
A flaw in the SPDY streaming code used by Kubelet, CRI‑O and kube‑apiserver can cause the affected components to become unresponsive. The vulnerability is a resource exhaustion issue (CWE‑770) that can interrupt normal cluster operations. When successfully exploited, it leads to a denial of service of the components involved, depriving administrators and applications that rely on pod port forwarding, execution, attachment or node proxying from operational availability.
Affected Systems
The affected components are Kubernetes Kubelet, the CRI‑O container runtime, and the kube‑apiserver. The specific product versions that contain the defect are not disclosed in the data provided. Any installation of these components that has not yet been patched is potentially vulnerable and should be reviewed for the presence of the fix.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, and no EPSS score is available, so the likelihood of an exploitation event is uncertain but cannot be excluded. The vulnerability is not marked in the CISA KEV catalog. Attackers who can assume cluster roles that permit pod port‑forwarding, execution, attachment, or node proxying are able to trigger the DoS path, typically by opening multiple SPDY streams that overwhelm component resources. The implications are a loss of availability for the affected services, which can cascade to impact dependent workloads.
OpenCVE Enrichment
Github GHSA