Skip to main content

CVE-2022-31080: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge

Medium
Published: Mon Jul 11 2022 (07/11/2022, 20:55:09 UTC)
Source: CVE
Vendor/Project: kubeedge
Product: kubeedge

Description

KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, a large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a WSClient will be in a denial of service. The software is affected If users who are authenticated to the edge side connect to `cloudhub` from the edge side through WebSocket protocol. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 03:49:55 UTC

Technical Analysis

CVE-2022-31080 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting KubeEdge, an open-source platform designed to extend containerized application orchestration to edge computing environments. The vulnerability exists in the viaduct WSClient component, which handles WebSocket communications between edge nodes and the cloud hub. Specifically, prior to versions 1.11.1, 1.10.2, and 1.9.4, the WSClient reads the entire body of a WebSocket response into memory without size restrictions. An attacker who is authenticated on the edge side and able to connect to the cloudhub via WebSocket can craft a request that triggers a response with an excessively large payload. This leads to memory exhaustion on the process invoking the WSClient, causing a denial of service (DoS) condition. The vulnerability requires authentication and user interaction in the sense that the attacker must be an authenticated edge user initiating the WebSocket connection. The impact is primarily on availability, as the affected process becomes unresponsive due to resource exhaustion. No known workarounds exist, but patches have been released in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 to address this issue by presumably implementing limits on response size or streaming mechanisms to avoid loading large responses fully into memory. There are no known exploits in the wild at this time, but the vulnerability poses a risk in environments where KubeEdge is deployed and edge users have authenticated access to cloudhub via WebSocket.

Potential Impact

For European organizations leveraging KubeEdge for edge computing and container orchestration, this vulnerability could lead to denial of service conditions on critical edge components. This can disrupt edge application availability, impacting operations that rely on real-time data processing or control at the edge, such as manufacturing automation, smart city infrastructure, or telecommunications. Since the attack requires authenticated access, insider threats or compromised edge credentials could be leveraged to exploit this vulnerability. The DoS could degrade service continuity, increase operational costs due to downtime, and potentially cascade into broader service disruptions if edge nodes are critical for upstream cloud services. Organizations with distributed edge deployments across Europe, especially in sectors like industrial IoT, energy, and transportation, may face operational risks. The absence of known exploits reduces immediate risk, but the vulnerability's nature means it could be weaponized in targeted attacks or insider misuse scenarios.

Mitigation Recommendations

1. Immediate upgrade to patched KubeEdge versions 1.11.1, 1.10.2, or 1.9.4 to eliminate the vulnerability. 2. Implement strict access controls and monitoring on edge user authentication to minimize the risk of credential compromise or misuse. 3. Deploy network segmentation to isolate edge nodes and limit WebSocket connections to trusted entities only. 4. Monitor WebSocket traffic for unusually large payloads or abnormal patterns that could indicate exploitation attempts. 5. Use resource limits and quotas at the container or process level to prevent a single process from exhausting system memory. 6. Conduct regular audits of edge node configurations and user privileges to ensure compliance with security policies. 7. Develop incident response plans specifically addressing edge node DoS scenarios to minimize downtime. 8. Engage with KubeEdge community or vendors for updates and security advisories to stay ahead of emerging threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3629

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 3:49:55 AM

Last updated: 8/12/2025, 1:02:54 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats