Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0793: Improper Input Validation

0
High
VulnerabilityCVE-2024-0793cvecve-2024-0793
Published: Sun Nov 17 2024 (11/17/2024, 10:45:50 UTC)
Source: CVE Database V5

Description

A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:10:48 UTC

Technical Analysis

CVE-2024-0793 is a vulnerability identified in the kube-controller-manager (KCM) component of Kubernetes, a widely used container orchestration platform. The flaw stems from improper input validation when an HPA (Horizontal Pod Autoscaler) configuration YAML file is applied without including the .spec.behavior.scaleUp block. The absence of this block triggers a fault in the KCM, causing its pods to enter a restart churn loop. This continuous restarting leads to a denial of service (DoS) condition, effectively disrupting the availability of the controller manager and potentially impacting cluster operations that depend on it. The vulnerability has a CVSS 3.1 base score of 7.7, indicating high severity. The vector (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) shows that it can be exploited remotely over the network with low complexity and requires low privileges but no user interaction. The scope is changed (S:C), meaning the impact extends beyond the vulnerable component itself. While confidentiality and integrity are unaffected, the availability impact is high. No known exploits have been reported in the wild, but the potential for disruption in critical Kubernetes environments is significant. The vulnerability affects all versions indicated as '0' in the data, which likely means initial or unspecified versions, and users should monitor vendor advisories for patches. The root cause is insufficient validation of the HPA configuration schema, specifically the missing scaleUp behavior block, which the KCM does not handle gracefully, leading to instability.

Potential Impact

The primary impact of CVE-2024-0793 is a denial of service condition on the kube-controller-manager pods, which are essential for managing Kubernetes cluster control loops, including scaling and lifecycle management of pods. Disruption of KCM availability can lead to degraded cluster functionality, delayed or failed scaling operations, and potential cascading effects on workloads relying on autoscaling. For organizations relying heavily on Kubernetes for production workloads, this can translate into downtime, reduced reliability, and operational challenges. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are not a direct concern. However, the loss of availability in critical infrastructure components can affect service delivery, especially in cloud-native environments, DevOps pipelines, and microservices architectures. The ease of exploitation and network accessibility increase the risk profile, particularly for multi-tenant or exposed Kubernetes clusters. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-0793, organizations should implement the following specific measures: 1) Validate all HPA configuration YAML files before applying them to ensure the .spec.behavior.scaleUp block is present and correctly defined, using schema validation tools or admission controllers. 2) Employ Kubernetes admission webhooks to enforce configuration policies that prevent incomplete or malformed HPA specs from being accepted. 3) Monitor kube-controller-manager pod health and logs for signs of restart churn or instability to detect exploitation attempts early. 4) Restrict access to the Kubernetes API server to trusted users with appropriate privileges to reduce the risk of malicious or accidental application of vulnerable configurations. 5) Stay current with vendor advisories and apply patches or updates to kube-controller-manager as soon as they are released. 6) Consider implementing redundancy and failover mechanisms for control plane components to minimize downtime in case of pod restarts. 7) Use role-based access control (RBAC) to limit who can create or modify HPA resources, reducing the attack surface. These targeted actions go beyond generic advice by focusing on configuration validation, access control, and proactive monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-22T21:32:10.068Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6de5b7ef31ef0b5904a2

Added to database: 2/25/2026, 9:47:17 PM

Last enriched: 2/26/2026, 11:10:48 AM

Last updated: 4/12/2026, 5:06:36 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses