InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters
Technology

Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters

September 16, 2025 3 Min Read
Share

Cybersecurity researchers have uncovered multiple critical security vulnerabilities in the chaos mesh, which, if exploited successfully, could lead to cluster takeovers in the Kubernetes environment.

“Attackers must exploit these vulnerabilities and minimize network access within the cluster to perform more malicious actions, such as platform failure injections (such as pod shutdowns and network communication disruptions), and steal privileged service account tokens.

Chaos Mesh is an open source, cloud-native chaos engineering platform that provides different types of fault simulation and simulates various anomalies that can occur during the software development lifecycle.

The issues that are collectively known as confounding are listed below –

  • CVE-2025-59358 (CVSS Score: 7.5) – Chaos Mesh’s Chaos Controller Manager exposes GraphQL debug servers without authentication across Kubernetes clusters.
  • CVE-2025-59359 (CVSS score: 9.8) – CleanTCS mutation in Chaos Controller Manager is vulnerable to operating system command injection
  • CVE-2025-59360 (CVSS score: 9.8) – KillProcesses mutation in Chaos Controller Manager is vulnerable to operating system command injection
  • CVE-2025-59361 (CVSS score: 9.8) – Cleaniptables mutation in Chaos Controller Manager is vulnerable to operating system command injection

Remote code execution can also be performed with the default configuration of CHAOS MESH using attackers within the cluster, namely CVE-2025-59359, CVE-2025-59360, CVE-2025-59361, or CVE-2025-59358, which are threat actors with initial access to the cluster’s network.

JFrog said the vulnerability involves inadequate authentication mechanisms within the GraphQL Server of Chaos Controller Manager, allowing unauthenticated attackers to execute arbitrary commands in Chaos Daemon, resulting in cluster takeover.

Threat actors can leverage access to potentially exfiltrating data, disrupt critical services, or even move clusters sideways to escalate privileges.

See also  North Korean hackers turn JSON service into covert malware delivery channel

Following the responsible disclosure on May 6, 2025, all the defects identified were addressed by Chaos Mesh on August 21 with the release of version 2.7.3.

Users are advised to update their installation to the latest version as soon as possible. If immediate patching is not an option, we recommend limiting network traffic to the chaotic mesh daemon and API servers, and not running chaotic meshes in open or loose environments.

Share This Article
Twitter Copy Link
Previous Article Destiny2 Player "I'll mourn" When the edge of fate sinks to a 10% rating with steam Destiny2 Player "I’ll mourn" When the edge of fate sinks to a 10% rating with steam
Next Article Did you not see the Bad Bunny in Puerto Rico? He is live streaming his last concert Did you not see the Bad Bunny in Puerto Rico? He is live streaming his last concert

You Might Also Like

DeskRAT Malware Campaign
Technology

APT36 targets Indian government with Golang-based DeskRAT malware campaign

8 Min Read
New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
Technology

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

4 Min Read
WhatsApp malware 'Maverick' hijacks browser sessions and targets Brazil's largest banks
Technology

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

9 Min Read
CISA adds actively exploited flaw in Sierra wireless routers that enables RCE attacks
Technology

CISA adds actively exploited flaw in Sierra wireless routers that enables RCE attacks

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?