Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx

0
Medium
VulnerabilityCVE-2026-24514cvecve-2026-24514cwe-770
Published: Tue Feb 03 2026 (02/03/2026, 22:17:25 UTC)
Source: CVE Database V5
Vendor/Project: Kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 12:41:59 UTC

Technical Analysis

CVE-2026-24514 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the ingress-nginx component of Kubernetes. The ingress-nginx controller includes a validating admission controller feature that processes incoming requests to enforce policies before they reach the cluster. This vulnerability arises because the admission controller does not impose limits or throttling on the size or volume of requests it processes. An attacker with network access can send abnormally large or numerous requests to the validating admission controller, causing it to consume excessive memory resources. This uncontrolled memory consumption can exhaust the memory allocated to the ingress-nginx controller pod, causing the pod to be terminated by the Kubernetes scheduler or the node to run out of memory, potentially impacting other workloads on the same node. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no patches or known exploits publicly available at the time of publication, but the risk of denial of service remains significant for clusters using ingress-nginx with the vulnerable validating admission controller enabled.

Potential Impact

The primary impact of CVE-2026-24514 is denial of service (DoS) due to resource exhaustion. Organizations running Kubernetes clusters with ingress-nginx controllers that have the vulnerable validating admission controller enabled may experience pod crashes or node instability caused by memory exhaustion. This can lead to service outages for applications relying on ingress-nginx for routing and load balancing, affecting availability and potentially causing cascading failures in dependent services. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are not direct concerns. However, the disruption of critical ingress services can severely impact business operations, especially for environments with high traffic or multi-tenant clusters. The ease of exploitation (network access with low privileges and no user interaction) increases the risk, particularly in public-facing clusters or those exposed to untrusted networks.

Mitigation Recommendations

To mitigate CVE-2026-24514, organizations should implement the following specific measures: 1) Apply any available patches or updates from the Kubernetes ingress-nginx project as soon as they are released. 2) If patches are not yet available, consider disabling the validating admission controller feature temporarily or restricting its exposure to trusted networks only. 3) Implement resource limits and request quotas at the Kubernetes pod and container level to prevent ingress-nginx pods from consuming excessive memory. 4) Use network policies or firewall rules to limit access to the admission controller endpoint, allowing only trusted sources to send requests. 5) Monitor ingress-nginx controller pod memory usage and node memory pressure closely to detect abnormal consumption early. 6) Employ rate limiting or request size restrictions at upstream load balancers or API gateways to prevent large or excessive requests from reaching the admission controller. 7) Conduct regular security assessments and penetration tests focusing on ingress-nginx components to identify potential exploitation attempts. These targeted mitigations go beyond generic advice by focusing on controlling resource consumption and limiting attack surface exposure specific to the validating admission controller.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2026-01-23T06:54:35.913Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69827a75f9fa50a62fe57fec

Added to database: 2/3/2026, 10:45:09 PM

Last enriched: 2/19/2026, 12:41:59 PM

Last updated: 3/21/2026, 3:20:05 PM

Views: 281

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses