CVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.
AI Analysis
Technical Summary
CVE-2026-24514 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the ingress-nginx component of Kubernetes. The ingress-nginx controller includes a validating admission controller feature that processes incoming requests to enforce policies before they reach the cluster. This vulnerability arises because the admission controller does not impose limits or throttling on the size or volume of requests it processes. An attacker with network access can send abnormally large or numerous requests to the validating admission controller, causing it to consume excessive memory resources. This uncontrolled memory consumption can exhaust the memory allocated to the ingress-nginx controller pod, causing the pod to be terminated by the Kubernetes scheduler or the node to run out of memory, potentially impacting other workloads on the same node. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no patches or known exploits publicly available at the time of publication, but the risk of denial of service remains significant for clusters using ingress-nginx with the vulnerable validating admission controller enabled.
Potential Impact
The primary impact of CVE-2026-24514 is denial of service (DoS) due to resource exhaustion. Organizations running Kubernetes clusters with ingress-nginx controllers that have the vulnerable validating admission controller enabled may experience pod crashes or node instability caused by memory exhaustion. This can lead to service outages for applications relying on ingress-nginx for routing and load balancing, affecting availability and potentially causing cascading failures in dependent services. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are not direct concerns. However, the disruption of critical ingress services can severely impact business operations, especially for environments with high traffic or multi-tenant clusters. The ease of exploitation (network access with low privileges and no user interaction) increases the risk, particularly in public-facing clusters or those exposed to untrusted networks.
Mitigation Recommendations
To mitigate CVE-2026-24514, organizations should implement the following specific measures: 1) Apply any available patches or updates from the Kubernetes ingress-nginx project as soon as they are released. 2) If patches are not yet available, consider disabling the validating admission controller feature temporarily or restricting its exposure to trusted networks only. 3) Implement resource limits and request quotas at the Kubernetes pod and container level to prevent ingress-nginx pods from consuming excessive memory. 4) Use network policies or firewall rules to limit access to the admission controller endpoint, allowing only trusted sources to send requests. 5) Monitor ingress-nginx controller pod memory usage and node memory pressure closely to detect abnormal consumption early. 6) Employ rate limiting or request size restrictions at upstream load balancers or API gateways to prevent large or excessive requests from reaching the admission controller. 7) Conduct regular security assessments and penetration tests focusing on ingress-nginx components to identify potential exploitation attempts. These targeted mitigations go beyond generic advice by focusing on controlling resource consumption and limiting attack surface exposure specific to the validating admission controller.
Affected Countries
United States, Germany, United Kingdom, Japan, India, Canada, Australia, France, Netherlands, South Korea
CVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
Description
A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-24514 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the ingress-nginx component of Kubernetes. The ingress-nginx controller includes a validating admission controller feature that processes incoming requests to enforce policies before they reach the cluster. This vulnerability arises because the admission controller does not impose limits or throttling on the size or volume of requests it processes. An attacker with network access can send abnormally large or numerous requests to the validating admission controller, causing it to consume excessive memory resources. This uncontrolled memory consumption can exhaust the memory allocated to the ingress-nginx controller pod, causing the pod to be terminated by the Kubernetes scheduler or the node to run out of memory, potentially impacting other workloads on the same node. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no patches or known exploits publicly available at the time of publication, but the risk of denial of service remains significant for clusters using ingress-nginx with the vulnerable validating admission controller enabled.
Potential Impact
The primary impact of CVE-2026-24514 is denial of service (DoS) due to resource exhaustion. Organizations running Kubernetes clusters with ingress-nginx controllers that have the vulnerable validating admission controller enabled may experience pod crashes or node instability caused by memory exhaustion. This can lead to service outages for applications relying on ingress-nginx for routing and load balancing, affecting availability and potentially causing cascading failures in dependent services. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are not direct concerns. However, the disruption of critical ingress services can severely impact business operations, especially for environments with high traffic or multi-tenant clusters. The ease of exploitation (network access with low privileges and no user interaction) increases the risk, particularly in public-facing clusters or those exposed to untrusted networks.
Mitigation Recommendations
To mitigate CVE-2026-24514, organizations should implement the following specific measures: 1) Apply any available patches or updates from the Kubernetes ingress-nginx project as soon as they are released. 2) If patches are not yet available, consider disabling the validating admission controller feature temporarily or restricting its exposure to trusted networks only. 3) Implement resource limits and request quotas at the Kubernetes pod and container level to prevent ingress-nginx pods from consuming excessive memory. 4) Use network policies or firewall rules to limit access to the admission controller endpoint, allowing only trusted sources to send requests. 5) Monitor ingress-nginx controller pod memory usage and node memory pressure closely to detect abnormal consumption early. 6) Employ rate limiting or request size restrictions at upstream load balancers or API gateways to prevent large or excessive requests from reaching the admission controller. 7) Conduct regular security assessments and penetration tests focusing on ingress-nginx components to identify potential exploitation attempts. These targeted mitigations go beyond generic advice by focusing on controlling resource consumption and limiting attack surface exposure specific to the validating admission controller.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- kubernetes
- Date Reserved
- 2026-01-23T06:54:35.913Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69827a75f9fa50a62fe57fec
Added to database: 2/3/2026, 10:45:09 PM
Last enriched: 2/19/2026, 12:41:59 PM
Last updated: 3/21/2026, 3:20:05 PM
Views: 281
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.