CVE-2022-31080: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, a large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a WSClient will be in a denial of service. The software is affected If users who are authenticated to the edge side connect to `cloudhub` from the edge side through WebSocket protocol. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There are currently no known workarounds.
AI Analysis
Technical Summary
CVE-2022-31080 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting KubeEdge, an open-source platform designed to extend containerized application orchestration to edge computing environments. The vulnerability exists in the viaduct WSClient component, which handles WebSocket communications between edge nodes and the cloud hub. Specifically, prior to versions 1.11.1, 1.10.2, and 1.9.4, the WSClient reads the entire body of a WebSocket response into memory without size restrictions. An attacker who is authenticated on the edge side and able to connect to the cloudhub via WebSocket can craft a request that triggers a response with an excessively large payload. This leads to memory exhaustion on the process invoking the WSClient, causing a denial of service (DoS) condition. The vulnerability requires authentication and user interaction in the sense that the attacker must be an authenticated edge user initiating the WebSocket connection. The impact is primarily on availability, as the affected process becomes unresponsive due to resource exhaustion. No known workarounds exist, but patches have been released in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 to address this issue by presumably implementing limits on response size or streaming mechanisms to avoid loading large responses fully into memory. There are no known exploits in the wild at this time, but the vulnerability poses a risk in environments where KubeEdge is deployed and edge users have authenticated access to cloudhub via WebSocket.
Potential Impact
For European organizations leveraging KubeEdge for edge computing and container orchestration, this vulnerability could lead to denial of service conditions on critical edge components. This can disrupt edge application availability, impacting operations that rely on real-time data processing or control at the edge, such as manufacturing automation, smart city infrastructure, or telecommunications. Since the attack requires authenticated access, insider threats or compromised edge credentials could be leveraged to exploit this vulnerability. The DoS could degrade service continuity, increase operational costs due to downtime, and potentially cascade into broader service disruptions if edge nodes are critical for upstream cloud services. Organizations with distributed edge deployments across Europe, especially in sectors like industrial IoT, energy, and transportation, may face operational risks. The absence of known exploits reduces immediate risk, but the vulnerability's nature means it could be weaponized in targeted attacks or insider misuse scenarios.
Mitigation Recommendations
1. Immediate upgrade to patched KubeEdge versions 1.11.1, 1.10.2, or 1.9.4 to eliminate the vulnerability. 2. Implement strict access controls and monitoring on edge user authentication to minimize the risk of credential compromise or misuse. 3. Deploy network segmentation to isolate edge nodes and limit WebSocket connections to trusted entities only. 4. Monitor WebSocket traffic for unusually large payloads or abnormal patterns that could indicate exploitation attempts. 5. Use resource limits and quotas at the container or process level to prevent a single process from exhausting system memory. 6. Conduct regular audits of edge node configurations and user privileges to ensure compliance with security policies. 7. Develop incident response plans specifically addressing edge node DoS scenarios to minimize downtime. 8. Engage with KubeEdge community or vendors for updates and security advisories to stay ahead of emerging threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-31080: CWE-400: Uncontrolled Resource Consumption in kubeedge kubeedge
Description
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, a large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a WSClient will be in a denial of service. The software is affected If users who are authenticated to the edge side connect to `cloudhub` from the edge side through WebSocket protocol. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There are currently no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-31080 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting KubeEdge, an open-source platform designed to extend containerized application orchestration to edge computing environments. The vulnerability exists in the viaduct WSClient component, which handles WebSocket communications between edge nodes and the cloud hub. Specifically, prior to versions 1.11.1, 1.10.2, and 1.9.4, the WSClient reads the entire body of a WebSocket response into memory without size restrictions. An attacker who is authenticated on the edge side and able to connect to the cloudhub via WebSocket can craft a request that triggers a response with an excessively large payload. This leads to memory exhaustion on the process invoking the WSClient, causing a denial of service (DoS) condition. The vulnerability requires authentication and user interaction in the sense that the attacker must be an authenticated edge user initiating the WebSocket connection. The impact is primarily on availability, as the affected process becomes unresponsive due to resource exhaustion. No known workarounds exist, but patches have been released in KubeEdge versions 1.11.1, 1.10.2, and 1.9.4 to address this issue by presumably implementing limits on response size or streaming mechanisms to avoid loading large responses fully into memory. There are no known exploits in the wild at this time, but the vulnerability poses a risk in environments where KubeEdge is deployed and edge users have authenticated access to cloudhub via WebSocket.
Potential Impact
For European organizations leveraging KubeEdge for edge computing and container orchestration, this vulnerability could lead to denial of service conditions on critical edge components. This can disrupt edge application availability, impacting operations that rely on real-time data processing or control at the edge, such as manufacturing automation, smart city infrastructure, or telecommunications. Since the attack requires authenticated access, insider threats or compromised edge credentials could be leveraged to exploit this vulnerability. The DoS could degrade service continuity, increase operational costs due to downtime, and potentially cascade into broader service disruptions if edge nodes are critical for upstream cloud services. Organizations with distributed edge deployments across Europe, especially in sectors like industrial IoT, energy, and transportation, may face operational risks. The absence of known exploits reduces immediate risk, but the vulnerability's nature means it could be weaponized in targeted attacks or insider misuse scenarios.
Mitigation Recommendations
1. Immediate upgrade to patched KubeEdge versions 1.11.1, 1.10.2, or 1.9.4 to eliminate the vulnerability. 2. Implement strict access controls and monitoring on edge user authentication to minimize the risk of credential compromise or misuse. 3. Deploy network segmentation to isolate edge nodes and limit WebSocket connections to trusted entities only. 4. Monitor WebSocket traffic for unusually large payloads or abnormal patterns that could indicate exploitation attempts. 5. Use resource limits and quotas at the container or process level to prevent a single process from exhausting system memory. 6. Conduct regular audits of edge node configurations and user privileges to ensure compliance with security policies. 7. Develop incident response plans specifically addressing edge node DoS scenarios to minimize downtime. 8. Engage with KubeEdge community or vendors for updates and security advisories to stay ahead of emerging threats.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3629
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 3:49:55 AM
Last updated: 2/7/2026, 1:02:57 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.