Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31080: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge

0
Medium
Published: Mon Jul 11 2022 (07/11/2022, 20:55:09 UTC)
Source: CVE
Vendor/Project: kubeedge
Product: kubeedge

Description

KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, a large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a WSClient will be in a denial of service. The software is affected If users who are authenticated to the edge side connect to `cloudhub` from the edge side through WebSocket protocol. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 03:49:55 UTC

Technical Analysis

CVE-2022-31080 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting KubeEdge, an open-source platform designed to extend containerized application orchestration to edge computing environments. The vulnerability exists in the viaduct WSClient component, which handles WebSocket communications between edge nodes and the cloud hub. Specifically, prior to versions 1.11.1, 1.10.2, and 1.9.4, the WSClient reads the entire body of a WebSocket response into memory without size restrictions. An attacker who is authenticated on the edge side and able to connect to the cloudhub via WebSocket can craft a request that triggers a response with an excessively large payload. This leads to memory exhaustion on the process invoking the WSClient, causing a denial of service (DoS) condition. The vulnerability requires authentication and user interaction in the sense that the attacker must be an authenticated edge user initiating the WebSocket connection. The impact is primarily on availability, as the affected process becomes unresponsive due to resource exhaustion. No known workarounds exist, but patches have been released in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 to address this issue by presumably implementing limits on response size or streaming mechanisms to avoid loading large responses fully into memory. There are no known exploits in the wild at this time, but the vulnerability poses a risk in environments where KubeEdge is deployed and edge users have authenticated access to cloudhub via WebSocket.

Potential Impact

For European organizations leveraging KubeEdge for edge computing and container orchestration, this vulnerability could lead to denial of service conditions on critical edge components. This can disrupt edge application availability, impacting operations that rely on real-time data processing or control at the edge, such as manufacturing automation, smart city infrastructure, or telecommunications. Since the attack requires authenticated access, insider threats or compromised edge credentials could be leveraged to exploit this vulnerability. The DoS could degrade service continuity, increase operational costs due to downtime, and potentially cascade into broader service disruptions if edge nodes are critical for upstream cloud services. Organizations with distributed edge deployments across Europe, especially in sectors like industrial IoT, energy, and transportation, may face operational risks. The absence of known exploits reduces immediate risk, but the vulnerability's nature means it could be weaponized in targeted attacks or insider misuse scenarios.

Mitigation Recommendations

1. Immediate upgrade to patched KubeEdge versions 1.11.1, 1.10.2, or 1.9.4 to eliminate the vulnerability. 2. Implement strict access controls and monitoring on edge user authentication to minimize the risk of credential compromise or misuse. 3. Deploy network segmentation to isolate edge nodes and limit WebSocket connections to trusted entities only. 4. Monitor WebSocket traffic for unusually large payloads or abnormal patterns that could indicate exploitation attempts. 5. Use resource limits and quotas at the container or process level to prevent a single process from exhausting system memory. 6. Conduct regular audits of edge node configurations and user privileges to ensure compliance with security policies. 7. Develop incident response plans specifically addressing edge node DoS scenarios to minimize downtime. 8. Engage with KubeEdge community or vendors for updates and security advisories to stay ahead of emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3629

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 3:49:55 AM

Last updated: 2/7/2026, 1:02:57 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats