Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx

0
Medium
VulnerabilityCVE-2026-24514cvecve-2026-24514cwe-770
Published: Tue Feb 03 2026 (02/03/2026, 22:17:25 UTC)
Source: CVE Database V5
Vendor/Project: Kubernetes
Product: ingress-nginx

Description

CVE-2026-24514 is a medium severity vulnerability in Kubernetes ingress-nginx's validating admission controller that allows an attacker with limited privileges to cause a denial of service by sending large requests. This triggers uncontrolled memory consumption, potentially causing the ingress-nginx controller pod to be killed or the host node to run out of memory. The vulnerability does not impact confidentiality or integrity but severely affects availability. No user interaction is required, and exploitation can be performed remotely over the network. There are no known exploits in the wild yet, and no patches have been linked at this time. European organizations relying on Kubernetes ingress-nginx for managing ingress traffic should prioritize monitoring and resource limits to mitigate risk. Countries with high Kubernetes adoption and critical cloud infrastructure are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/03/2026, 22:59:48 UTC

Technical Analysis

CVE-2026-24514 is a vulnerability classified under CWE-770, which involves the allocation of resources without proper limits or throttling, specifically in the Kubernetes ingress-nginx validating admission controller. The validating admission controller is a component that intercepts and validates API requests to the Kubernetes API server. In this case, the controller does not impose adequate limits on the size or complexity of incoming requests. An attacker with at least limited privileges (PR:L) can send large or specially crafted requests to this controller, causing excessive memory consumption. This uncontrolled resource allocation can lead to the ingress-nginx controller pod being terminated by the Kubernetes scheduler due to out-of-memory (OOM) conditions or, in more severe cases, the entire node running the pod may exhaust its memory resources, impacting other workloads. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity loss. No patches have been published yet, and no known exploits exist in the wild. This vulnerability highlights the importance of proper resource management and request validation in Kubernetes components, especially those exposed to network traffic.

Potential Impact

For European organizations, the primary impact of CVE-2026-24514 is a denial of service condition affecting Kubernetes ingress-nginx controllers. This can disrupt ingress traffic management, causing service outages or degraded performance for applications relying on Kubernetes ingress. Organizations with critical services exposed via ingress-nginx may experience downtime, impacting business continuity and customer experience. In multi-tenant or shared environments, a single malicious actor could degrade cluster stability, affecting multiple teams or customers. The risk is heightened in cloud-native deployments where ingress-nginx is widely used for routing and load balancing. While confidentiality and integrity are not directly impacted, availability degradation can lead to indirect consequences such as delayed incident response or loss of trust. European entities with strict uptime requirements or regulatory obligations around service availability (e.g., financial institutions, healthcare providers) may face compliance risks if outages occur. Additionally, resource exhaustion at the node level could impact other critical workloads, amplifying the operational impact.

Mitigation Recommendations

To mitigate CVE-2026-24514, European organizations should implement specific controls beyond generic Kubernetes hardening: 1) Enforce strict resource limits and requests on ingress-nginx controller pods to prevent node-wide memory exhaustion. 2) Configure admission controller request size limits and rate limiting where possible to restrict large or excessive requests. 3) Monitor ingress-nginx controller pod memory usage and set up alerts for anomalous spikes. 4) Use network policies or firewall rules to restrict access to the admission controller endpoint to trusted sources only. 5) Regularly update ingress-nginx to the latest stable versions once patches are released. 6) Employ runtime security tools to detect and block abnormal API request patterns targeting the admission controller. 7) Conduct penetration testing and fuzzing on admission controller interfaces to identify potential abuse vectors. 8) Consider deploying ingress-nginx in isolated namespaces or nodes to contain impact. 9) Review Kubernetes audit logs for suspicious large request patterns. 10) Engage with Kubernetes community and vendors for timely vulnerability disclosures and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2026-01-23T06:54:35.913Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69827a75f9fa50a62fe57fec

Added to database: 2/3/2026, 10:45:09 PM

Last enriched: 2/3/2026, 10:59:48 PM

Last updated: 2/4/2026, 1:33:02 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats