CVE-2022-31073: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, the ServiceBus server on the edge side may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it. It is possible for the node to be exhausted of memory. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to allocate memory and thus causing a denial of service. Malicious apps accidentally pulled by users on the host and have the access to send HTTP requests to localhost may make an attack. It will be affected only when users enable the `ServiceBus` module in the config file `edgecore.yaml`. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. As a workaround, disable the `ServiceBus` module in the config file `edgecore.yaml`.
AI Analysis
Technical Summary
CVE-2022-31073 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the open-source project KubeEdge, which extends container orchestration capabilities to edge computing nodes. Specifically, the flaw resides in the ServiceBus server component on the edge side. In affected versions prior to 1.9.4, between 1.10.0 and 1.10.2 (exclusive), and version 1.11.0, the ServiceBus server does not properly limit the size of HTTP request bodies it processes. An attacker can exploit this by sending an HTTP request with an excessively large body to the ServiceBus server, causing the node to exhaust its available memory resources. This memory exhaustion leads to denial of service (DoS) conditions not only for the ServiceBus module but also for other services and containers running on the same node, as they fail to allocate memory. The vulnerability requires that the ServiceBus module be enabled in the edgecore.yaml configuration file, and that the attacker has the ability to send HTTP requests to localhost on the edge node. This implies that malicious applications running on the host or containers with localhost access can trigger the attack. The vulnerability has been addressed in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 by implementing proper request size validation or resource limits. As a temporary mitigation, disabling the ServiceBus module in the configuration file prevents exploitation. There are no known exploits in the wild reported to date. The vulnerability impacts the availability of edge nodes by enabling resource exhaustion through unregulated HTTP request sizes, potentially disrupting edge computing workloads and services dependent on KubeEdge's orchestration capabilities.
Potential Impact
For European organizations leveraging edge computing infrastructures, particularly those using KubeEdge for container orchestration at the edge, this vulnerability poses a significant risk to service availability. Edge nodes often operate in resource-constrained environments and support critical applications such as IoT data processing, industrial automation, and real-time analytics. A successful exploitation could lead to denial of service on edge nodes, disrupting these critical services and potentially causing cascading failures in distributed systems. This disruption could affect sectors like manufacturing, smart cities, telecommunications, and energy management, where edge computing is increasingly deployed. Furthermore, since the attack can be launched from within the host or containers with localhost access, compromised or malicious workloads could be leveraged to trigger the DoS, increasing the risk from insider threats or supply chain compromises. The impact on confidentiality and integrity is minimal, as the vulnerability primarily affects availability. However, service outages at the edge could indirectly affect data collection and processing pipelines, leading to operational inefficiencies and potential compliance issues with data availability requirements.
Mitigation Recommendations
1. Upgrade KubeEdge to versions 1.11.1, 1.10.2, or 1.9.4 or later where the vulnerability is patched. This is the most effective and recommended mitigation. 2. If immediate upgrade is not feasible, disable the ServiceBus module in the edgecore.yaml configuration file to prevent the vulnerable component from running. 3. Implement strict network segmentation and access controls to limit which containers or applications can send HTTP requests to localhost on edge nodes, reducing the risk of malicious internal actors exploiting the vulnerability. 4. Monitor edge node resource usage closely for abnormal memory consumption patterns that could indicate attempted exploitation. 5. Employ runtime security tools to detect and block anomalous HTTP requests with unusually large bodies targeting the ServiceBus server. 6. Conduct regular security audits of container images and workloads deployed on edge nodes to prevent introduction of malicious applications capable of exploiting this vulnerability. 7. Establish incident response procedures specifically for edge node service disruptions to minimize downtime and impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-31073: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge
Description
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, the ServiceBus server on the edge side may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it. It is possible for the node to be exhausted of memory. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to allocate memory and thus causing a denial of service. Malicious apps accidentally pulled by users on the host and have the access to send HTTP requests to localhost may make an attack. It will be affected only when users enable the `ServiceBus` module in the config file `edgecore.yaml`. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. As a workaround, disable the `ServiceBus` module in the config file `edgecore.yaml`.
AI-Powered Analysis
Technical Analysis
CVE-2022-31073 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the open-source project KubeEdge, which extends container orchestration capabilities to edge computing nodes. Specifically, the flaw resides in the ServiceBus server component on the edge side. In affected versions prior to 1.9.4, between 1.10.0 and 1.10.2 (exclusive), and version 1.11.0, the ServiceBus server does not properly limit the size of HTTP request bodies it processes. An attacker can exploit this by sending an HTTP request with an excessively large body to the ServiceBus server, causing the node to exhaust its available memory resources. This memory exhaustion leads to denial of service (DoS) conditions not only for the ServiceBus module but also for other services and containers running on the same node, as they fail to allocate memory. The vulnerability requires that the ServiceBus module be enabled in the edgecore.yaml configuration file, and that the attacker has the ability to send HTTP requests to localhost on the edge node. This implies that malicious applications running on the host or containers with localhost access can trigger the attack. The vulnerability has been addressed in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 by implementing proper request size validation or resource limits. As a temporary mitigation, disabling the ServiceBus module in the configuration file prevents exploitation. There are no known exploits in the wild reported to date. The vulnerability impacts the availability of edge nodes by enabling resource exhaustion through unregulated HTTP request sizes, potentially disrupting edge computing workloads and services dependent on KubeEdge's orchestration capabilities.
Potential Impact
For European organizations leveraging edge computing infrastructures, particularly those using KubeEdge for container orchestration at the edge, this vulnerability poses a significant risk to service availability. Edge nodes often operate in resource-constrained environments and support critical applications such as IoT data processing, industrial automation, and real-time analytics. A successful exploitation could lead to denial of service on edge nodes, disrupting these critical services and potentially causing cascading failures in distributed systems. This disruption could affect sectors like manufacturing, smart cities, telecommunications, and energy management, where edge computing is increasingly deployed. Furthermore, since the attack can be launched from within the host or containers with localhost access, compromised or malicious workloads could be leveraged to trigger the DoS, increasing the risk from insider threats or supply chain compromises. The impact on confidentiality and integrity is minimal, as the vulnerability primarily affects availability. However, service outages at the edge could indirectly affect data collection and processing pipelines, leading to operational inefficiencies and potential compliance issues with data availability requirements.
Mitigation Recommendations
1. Upgrade KubeEdge to versions 1.11.1, 1.10.2, or 1.9.4 or later where the vulnerability is patched. This is the most effective and recommended mitigation. 2. If immediate upgrade is not feasible, disable the ServiceBus module in the edgecore.yaml configuration file to prevent the vulnerable component from running. 3. Implement strict network segmentation and access controls to limit which containers or applications can send HTTP requests to localhost on edge nodes, reducing the risk of malicious internal actors exploiting the vulnerability. 4. Monitor edge node resource usage closely for abnormal memory consumption patterns that could indicate attempted exploitation. 5. Employ runtime security tools to detect and block anomalous HTTP requests with unusually large bodies targeting the ServiceBus server. 6. Conduct regular security audits of container images and workloads deployed on edge nodes to prevent introduction of malicious applications capable of exploiting this vulnerability. 7. Establish incident response procedures specifically for edge node service disruptions to minimize downtime and impact.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf66e3
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/22/2025, 12:20:08 AM
Last updated: 2/7/2026, 12:05:20 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.