As more organizations adopt containerization, Kubernetes adoption is at an all-time high. A key component to any Kubernetes cluster is allowing and managing external traffic to the services organizations are building. Enter, Ingress. As a powerful component and set of resources that expose services to the outside world, Ingress’ power and complexity lends itself to a considerable risk profile when compromised.
In this post, we dive into a grouping of critical vulnerabilities dubbed IngressNightmare and share actionable mitigation and detection strategies, including multiple ways in which SentinelOne’s Singularity Platform can highlight both IngressNightmare vulnerability exposure and possible exploitation in runtime.
Beyond this specific security risk, given understanding challenges in Ingress is crucial to maintaining a resilient Kubernetes environment, this post additionally contains troubleshooting tips to tackle common Ingress issues like SSL misconfigurations, routing anomalies, and performance bottlenecks. Understanding and overcoming these challenges is important in maintaining a resilient Kubernetes environment.
In Kubernetes, Ingress acts as a traffic manager, routing external access to services within your cluster. Ingress is composed of two key components: Ingress resources that define routing rules based on hostnames and paths, and an Ingress Controller (like the Ingress NGINX Controller) that implements these rules, typically by configuring a load balancer or reverse proxy (in this case, NGINX).
Below is an example of a YAML file wherein the Ingress resource defines the following routing rules:
example.com/ → frontend-service
example.com/api → backend-service
Using the above example, below is a Kubernetes architecture diagram showcasing Ingress routing traffic to specific services:
A series of critical security vulnerabilities, collectively known as IngressNightmare, have been discovered in the Ingress NGINX Controller for Kubernetes. These flaws, CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and the most severe, CVE-2025-1974, allow unauthenticated remote code execution (RCE) via the controller’s admission webhook, potentially enabling attackers to access all secrets across namespaces and take over entire clusters. CVE-2025-1974 is assigned a CVSS v3.1 base score of 9.8, making it a critical vulnerability in the context of the ingress-nginx controller.
These Ingress NGINX Controller vulnerabilities are tracked respectively as:
Successful exploitation of these vulnerabilities can result in:
Affected Ingress NGINX Controller Versions:
IngressNightmare works by exploiting weaknesses in Kubernetes Ingress NGNIX by leveraging misconfigurations and unauthorized access points. This is a multi-stage attack that starts with identifying vulnerable clusters and ends with an attacker gaining full control over them. Let’s briefly outline the stages of this attack:
Our recommendation is to first establish whether or not your clusters are vulnerable to this attack. Run the following command to check for vulnerable installations:
kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx
If your clusters are leveraging Ingress NGINX Controller and on a vulnerable version, we recommend the following.
If it isn’t possible to update, there are temporary mitigations available.
controller.admissionWebhooks.enabled=false
.ValidatingWebhookConfiguration
named ingress-nginx-admission
and remove the --validating-webhook
argument from the controller’s Deployment or DaemonSet.There are a number of ways in which SentinelOne keeps Kubernetes clusters safe. To focus on IngressNightmare as a specific threat, Singularity Platform identifies whether the vulnerabilities are present, validates if they are externally accessible (which is a high likelihood given the nature of ingress), and maps the affected resources. Additionally, SentinelOne is able to detect and respond to this attack as it unfolds, and has powerful capabilities to threat hunt potential adversary activity that would be seen post-exploit.
The range of detections are common for SentinelOne as we look to provide proactive alerts about your cluster health to help you reduce your exposures and attack surface as well as powerful reactive runtime defensive capabilities. The proactive capabilities are found within SentinelOne’s Cloud Native Security (CNS), and in this instance, its Kubernetes Security Posture Management (KSPM) and Offensive Security Engine features.
KSPM helps protect Kubernetes Clusters by identifying misconfigurations and vulnerabilities that may otherwise go unnoticed. Below is a screenshot of one of CNS’ KSPM policies that hunts for this specific vulnerability:
With its “attacker’s mindset” and scanning capabilities, the Offensive Security Engine goes a step further. It establishes where the vulnerability is externally accessible and identifies the connected exposed assets vulnerable to IngressNightmare. Finally, because of the nature of the Offensive Security Engine, each alert is verified with evidence. Below is a screenshot of an alert prompted by the Offensive Security Engine:
As we shift our focus from proactive to reactive security, we go from a passive to active view of this threat and any potential exploitation. SentinelOne’s Cloud Workload Security agent, deployable via DaemonSet, provides runtime detection in both on-prem and cloud-managed Kubernetes clusters. As adversaries look to leverage the IngressNightmare vulnerabilities to impact the cluster, for example via credential harvesting, the malicious processes are detected in real time.
Moving outside a process view, below is an example of Cloud Workload Security’s graphical view of affected assets and an alert for an adversary attempting a reverse shell post initial exploitation:
Finally, for SentinelOne customers looking to proactively hunt for potential exploitation of IngressNightmare, we recommend checking for anomalies such as Behavioral Indicators present in the ingress-nginx
namespace.
event.type = 'Behavioral Indicators' and (k8sCluster.namespace='ingress-nginx' or k8sCluster.containerImage contains 'ingress-nginx/controller')
Customers can review destination IPs in outbound connections originating from Ingress Nginx to identify potentially compromised instances.
(k8sCluster.namespace='ingress-nginx' or k8sCluster.containerImage contains 'ingress-nginx/controller') event.type = 'IP Connect' event.network.direction='OUTGOING'
For instances of Ingress Nginx configured to use a namespace other than the default (ingress-nginx
), the below query can help with a starting point for hunting and review of runtime activities.
dataSource.name = 'SentinelOne' and endpoint.os = 'linux' and tgt.process.name = 'nginx' and tgt.process.cmdline contains 'nginx-cfg' and tgt.process.cmdline contains ' -t'
Beyond IngressNightmare and other security vulnerabilities, Kubernetes Ingress can be challenging to manage in day-to-day operations. Here are some practical steps to diagnose and resolve frequent issues.
Symptoms:
Troubleshooting Steps:
kubectl describe secret your-tls-secret -n your-namespace
. Ensure both tls.crt
and tls.key
are correctly set.apiVersion: networking.k8s.io/v1kind: Ingressmetadata:name: example-ingressannotations:nginx.ingress.kubernetes.io/ssl-redirect: "true"spec:tls:- hosts:- example.comsecretName: your-tls-secret
Symptoms:
Troubleshooting Steps:
rules:- host: example.comhttp:paths:- path: /apipathType: Prefix # or Exact, based on your needbackend:service:name: api-serviceport:number: 80
curl -v https://example.com/api
. Analyze the verbose output to track where the request is routed.kubectl logs -l app.kubernetes.io/name=ingress-nginx -n ingress-nginx
kubectl get svc -n your-namespacekubectl get endpoints -n your-namespace
Symptoms:
Troubleshooting Steps:
annotations:nginx.ingress.kubernetes.io/rewrite-target: /nginx.ingress.kubernetes.io/ssl-redirect: "true"
annotations:traefik.ingress.kubernetes.io/redirect-entry-point: https
Tip! Always refer to the official documentation for your specific Ingress controller to ensure annotations are correctly applied.
Symptoms:
Troubleshooting Steps:
kubectl top pod -n ingress-nginx
nginx.ingress.kubernetes.io/proxy-buffering: "on"nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"nginx.ingress.kubernetes.io/proxy-body-size: "10m"
kubectl scale deployment ingress-nginx-controller -n ingress-nginx --replicas=3
Securing Kubernetes clusters demands a multi-faceted approach inclusive of both proactive and reactive strategies. Threats like IngressNightmare highlight the need to have continuous visibility of your Kubernetes exposures alongside runtime security, and as always underline the criticality of immediate patching. The operational challenges of ingress though often require robust troubleshooting practices to help ensure smoother operation. By combining rigorous security measures with detailed diagnostics, you can safeguard your Kubernetes environment and maintain reliable service delivery.
Call to Action:
For those seeking further information on how Singularity Cloud Security provides both proactive and reactive security for on-premise and cloud hosted Kubernetes clusters.
For a broader view of Kubernetes risks, our recent blog posts go into detail of the nature of Kubernetes Privilege Escalation specifically, and a walkthrough of how a chain of risks, much like IngressNightmare can lead to total cluster compromise.