← Back to Blog
Security Research2021

Kubernetes Exposed: Exploiting the Kubelet API

By Assaf Morag

Security research demonstrates how attackers can exploit misconfigured Kubelet APIs to gain unauthorized access to Kubernetes clusters. The Kubelet is a critical component of Kubernetes that runs on each node, and misconfigurations can expose entire clusters to compromise.

This research reveals common misconfigurations that expose the Kubelet API, and demonstrates attack techniques that can be used to exploit these misconfigurations for unauthorized access and privilege escalation.

Exploitation Techniques

  • Unauthenticated access to Kubelet API
  • Container execution through exposed endpoints
  • Privilege escalation to cluster-admin
  • Lateral movement within the cluster