InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters
Technology

Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters

September 16, 2025 3 Min Read
Share

Cybersecurity researchers have uncovered multiple critical security vulnerabilities in the chaos mesh, which, if exploited successfully, could lead to cluster takeovers in the Kubernetes environment.

“Attackers must exploit these vulnerabilities and minimize network access within the cluster to perform more malicious actions, such as platform failure injections (such as pod shutdowns and network communication disruptions), and steal privileged service account tokens.

Chaos Mesh is an open source, cloud-native chaos engineering platform that provides different types of fault simulation and simulates various anomalies that can occur during the software development lifecycle.

The issues that are collectively known as confounding are listed below –

  • CVE-2025-59358 (CVSS Score: 7.5) – Chaos Mesh’s Chaos Controller Manager exposes GraphQL debug servers without authentication across Kubernetes clusters.
  • CVE-2025-59359 (CVSS score: 9.8) – CleanTCS mutation in Chaos Controller Manager is vulnerable to operating system command injection
  • CVE-2025-59360 (CVSS score: 9.8) – KillProcesses mutation in Chaos Controller Manager is vulnerable to operating system command injection
  • CVE-2025-59361 (CVSS score: 9.8) – Cleaniptables mutation in Chaos Controller Manager is vulnerable to operating system command injection

Remote code execution can also be performed with the default configuration of CHAOS MESH using attackers within the cluster, namely CVE-2025-59359, CVE-2025-59360, CVE-2025-59361, or CVE-2025-59358, which are threat actors with initial access to the cluster’s network.

JFrog said the vulnerability involves inadequate authentication mechanisms within the GraphQL Server of Chaos Controller Manager, allowing unauthenticated attackers to execute arbitrary commands in Chaos Daemon, resulting in cluster takeover.

Threat actors can leverage access to potentially exfiltrating data, disrupt critical services, or even move clusters sideways to escalate privileges.

See also  Evolution of UTA0388 espionage malware

Following the responsible disclosure on May 6, 2025, all the defects identified were addressed by Chaos Mesh on August 21 with the release of version 2.7.3.

Users are advised to update their installation to the latest version as soon as possible. If immediate patching is not an option, we recommend limiting network traffic to the chaotic mesh daemon and API servers, and not running chaotic meshes in open or loose environments.

Share This Article
Twitter Copy Link
Previous Article Destiny2 Player "I'll mourn" When the edge of fate sinks to a 10% rating with steam Destiny2 Player "I’ll mourn" When the edge of fate sinks to a 10% rating with steam
Next Article Did you not see the Bad Bunny in Puerto Rico? He is live streaming his last concert Did you not see the Bad Bunny in Puerto Rico? He is live streaming his last concert

You Might Also Like

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine
Technology

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

4 Min Read
Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
Technology

Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan

3 Min Read
X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?