<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Preventing Kubernetes Man-in-the-Middle Attacks in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Preventing-Kubernetes-Man-in-the-Middle-Attacks/m-p/41957#M52</link>
    <description>&lt;P&gt;On December 7th, 2020 the Kubernetes Product Security Committee disclosed a &lt;A href="https://discuss.kubernetes.io/t/security-advisory-cve-2020-8554-man-in-the-middle-using-loadbalancer-or-externalips/14003" target="_blank" rel="noopener"&gt;security issue&lt;/A&gt;&amp;nbsp;that affects &lt;STRONG&gt;every multi-tenant Kubernetes cluster.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If an attacker can create or edit services and pods, then they can also intercept traffic from other pods in the cluster. This issue has been rated medium severity (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L 2), and assigned &lt;STRONG&gt;CVE-2020-8554&lt;/STRONG&gt;. Notably, &lt;STRONG&gt;NO PATCH&lt;/STRONG&gt; is available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Protecting Kubernetes clusters pretty much sums up my December. Here are some &lt;A href="https://sysdig.com/blog/detect-cve-2020-8554-using-falco/" target="_blank" rel="noopener"&gt;tips&lt;/A&gt; using my favorite tools for detection. Stay safe and have fun protecting your Cloud!&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:44:13 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:44:13Z</dc:date>
    <item>
      <title>Preventing Kubernetes Man-in-the-Middle Attacks</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Preventing-Kubernetes-Man-in-the-Middle-Attacks/m-p/41957#M52</link>
      <description>&lt;P&gt;On December 7th, 2020 the Kubernetes Product Security Committee disclosed a &lt;A href="https://discuss.kubernetes.io/t/security-advisory-cve-2020-8554-man-in-the-middle-using-loadbalancer-or-externalips/14003" target="_blank" rel="noopener"&gt;security issue&lt;/A&gt;&amp;nbsp;that affects &lt;STRONG&gt;every multi-tenant Kubernetes cluster.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If an attacker can create or edit services and pods, then they can also intercept traffic from other pods in the cluster. This issue has been rated medium severity (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L 2), and assigned &lt;STRONG&gt;CVE-2020-8554&lt;/STRONG&gt;. Notably, &lt;STRONG&gt;NO PATCH&lt;/STRONG&gt; is available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Protecting Kubernetes clusters pretty much sums up my December. Here are some &lt;A href="https://sysdig.com/blog/detect-cve-2020-8554-using-falco/" target="_blank" rel="noopener"&gt;tips&lt;/A&gt; using my favorite tools for detection. Stay safe and have fun protecting your Cloud!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:44:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Preventing-Kubernetes-Man-in-the-Middle-Attacks/m-p/41957#M52</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:44:13Z</dc:date>
    </item>
  </channel>
</rss>

