Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

0
Critical
Published: Wed Feb 04 2026 (02/04/2026, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 15:03:41 UTC

Technical Analysis

The Ingress-NGINX Admission Controller version 1.11.1 contains a critical vulnerability involving file descriptor (FD) injection that can be exploited to achieve remote code execution (RCE). The admission controller is a component used in Kubernetes environments to manage and validate ingress traffic configurations. The vulnerability arises because the controller improperly handles file descriptors, allowing an attacker to inject malicious descriptors that can be leveraged to execute arbitrary code on the host system. This flaw bypasses authentication mechanisms, enabling remote attackers to gain control over the system running the controller. The exploit code, written in C, suggests a sophisticated attack that manipulates low-level system resources, increasing the risk of stealthy and reliable exploitation. No patches or CVSS scores have been released yet, but the critical severity rating reflects the high impact and ease of exploitation. This vulnerability threatens the confidentiality, integrity, and availability of affected systems, potentially allowing attackers to deploy malware, disrupt services, or move laterally within cloud-native environments. Given the widespread adoption of Kubernetes and NGINX ingress controllers in cloud infrastructure globally, this vulnerability poses a significant risk to organizations relying on these technologies.

Potential Impact

The potential impact of this vulnerability is severe. Successful exploitation leads to remote code execution, granting attackers full control over the affected system. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and the deployment of persistent malware or ransomware. In Kubernetes environments, compromising the ingress controller can allow attackers to manipulate network traffic, intercept or redirect requests, and escalate privileges within the cluster. The vulnerability undermines the security of cloud-native applications and infrastructure, potentially affecting multi-tenant environments and critical business operations. Organizations worldwide that rely on Ingress-NGINX Admission Controller 1.11.1 are at risk of significant operational and reputational damage if exploited.

Mitigation Recommendations

Organizations should immediately audit their Kubernetes environments to identify deployments running Ingress-NGINX Admission Controller version 1.11.1. Until an official patch is released, consider disabling or isolating the admission controller to limit exposure. Implement strict network segmentation and firewall rules to restrict access to the controller's endpoints. Employ runtime security tools and intrusion detection systems to monitor for anomalous behavior indicative of FD injection or RCE attempts. Regularly update Kubernetes components and ingress controllers to the latest stable versions once patches become available. Additionally, conduct thorough security reviews of admission controllers and enforce the principle of least privilege for service accounts and container permissions. Engage in proactive threat hunting for signs of exploitation and maintain robust incident response plans tailored to cloud-native environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Edb Id
52475
Has Exploit Code
true
Code Language
c

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

# Exploit Title:  Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE 
# Date: 2025-10-07
# Exploit Author: Beatriz Fresno Naumova
# Vendor Homepage: https://kubernetes.io
# Software Link: https://github.com/kubernetes/ingress-nginx
# Version: Affects v1.10.0 to v1.11.1 (potentially others)
# Tested on: Ubuntu 22.04, RKE2 Kubernetes Cluster
# CVE: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974

import os
import sys
import socket
import requests
import threading
from url
... (4266 more characters)
Code Length: 4,766 characters • Language: C/C++

Threat ID: 69845ddcf9fa50a62f0fd4a1

Added to database: 2/5/2026, 9:07:40 AM

Last enriched: 2/28/2026, 3:03:41 PM

Last updated: 3/24/2026, 12:45:32 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses