Description |
This article explains a critical command injection vulnerability, CVE-2025-1974, that has been identified in Kubernetes Ingress-NGINX. This issue occurs when --enable-annotation-snippets is active, allowing malicious headers to embed arbitrary commands into the generated NGINX configuration. Early evidence indicates attackers have already begun exploiting this weakness in live environments, leading to potential unauthorized access and lateral movement within Kubernetes clusters. |
Scope |
Affected Versions: Ingress-NGINX < v1.11.0, v1.11.0 - 1.11.4, v1.12.0, where snippet annotations are enabled (--enable-annotation-snippets=true). Attack Vector: Specially crafted HTTP headers that leverage snippet annotations (server-snippet) to inject commands. Potential Impact:
|
Solution |
1. Apply Official Patches: Upgrade to Ingress-NGINX versions 1.11.5, 1.12.1, or any later version. 2. Disable Snippet Annotations:
3. Implement Continuous Security and Posture Analysis
To explore advanced runtime threat detection capabilities, consider a demo of FortiCNAPP. |