Kubernetes NodeRestriction Bypass in Dynamic Resource Allocation CVE-2025-XXXXX (Low)

Listen to this Post

How the CVE Works

The vulnerability (CVE-2025-XXXXX) in Kubernetes occurs when the `DynamicResourceAllocation` feature gate is enabled. The `NodeRestriction` admission controller validates resource claim statuses during pod status updates but fails to enforce the same checks during pod creation. This oversight allows a compromised node to create mirror pods that bypass authorization, granting unauthorized access to dynamic resources. Attackers could exploit this flaw to escalate privileges by manipulating resource claims. The issue affects Kubernetes versions 1.32.0 to 1.32.5 and 1.33.0 to 1.33.1.

DailyCVE Form

Platform: Kubernetes
Version: 1.32.0-1.32.5, 1.33.0-1.33.1
Vulnerability: Authorization bypass
Severity: Low
Date: Jun 23, 2025

Prediction: Patch by Jul 10, 2025

What Undercode Say

kubectl get pods --all-namespaces
kubectl describe pod <malicious-pod>
kubectl auth can-i create pods --as=system:node:<compromised-node>

How Exploit

1. Compromise a Kubernetes node.

2. Create a malicious mirror pod.

3. Bypass dynamic resource checks.

4. Access unauthorized resources.

Protection from this CVE

  • Upgrade to Kubernetes 1.32.6 or 1.33.2.
  • Disable `DynamicResourceAllocation` if unused.
  • Enforce strict RBAC policies.

Impact

  • Unauthorized resource access.
  • Potential privilege escalation.
  • Cluster integrity compromise.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top