Five Key Features of Portainer
Five Key Features of Portainer 1. Docker Environments 2. Access Control 3. CI/CD Capabilities 4. …

In the world of Kubernetes orchestration, the Ingress NGINX Controller plays a central role as it serves as the gateway for traffic to applications within the cluster. However, recent discoveries by security researchers reveal that this essential component of Kubernetes poses significant security risks.
Researchers from Wiz Research have uncovered a series of Remote Code Execution (RCE) vulnerabilities known as IngressNightmare. The affected CVEs (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974) have a CVSS score of 9.8, making them critical threats.
In this article, we explain the impact of the vulnerabilities, affected systems, and the necessary measures to secure Kubernetes clusters.
The discovered vulnerabilities allow attackers to execute unauthenticated code on the Ingress NGINX Controller. This can grant them access to all secrets stored in the cluster and potentially gain complete control over the cluster.
Since Ingress NGINX is widely used in most Kubernetes environments, this vulnerability poses a significant risk.
Affected Systems:
The vulnerability specifically affects the Admission Controller of Ingress NGINX. By default, it is network-wide accessible and does not sufficiently authenticate requests.
An attacker can perform the following steps to compromise the system:
The danger of this vulnerability lies in the fact that attackers do not need specific permissions and can trigger a compromise with just a single malicious request.
The good news is that security patches are already available. Companies should act immediately to protect their Kubernetes clusters.
The current, secure version of the Ingress NGINX Controller is 1.12.1 or 1.11.5. All previous versions are considered insecure.
We have therefore updated all instances in our Managed Clusters to version 0.4.12 of the Helm Charts today to secure our systems.
If the Admission Controller is used, it should be ensured that it is not publicly accessible. This can be achieved through the following measures:
If an immediate update cannot be performed, the Admission Controller should be disabled. This can be achieved through the following methods:
To protect against vulnerabilities in the long term, we recommend:
The IngressNightmare vulnerabilities once again highlight the importance of regularly patching and reviewing security configurations of Kubernetes clusters. Since Ingress NGINX is used in almost every Kubernetes cluster, this vulnerability poses a serious threat.
Through our swift action and the update to version 0.4.12, we have ensured that our systems are protected from these attacks. Companies should urgently analyze their environment and, if affected, promptly implement updates and security measures.
The security of Kubernetes is a continuous process – with regular updates and a well-thought-out security strategy, companies can effectively protect their systems.
Five Key Features of Portainer 1. Docker Environments 2. Access Control 3. CI/CD Capabilities 4. …
Editorial Christmas Eve is traditionally the moment when you convince yourself that nothing …
Editorial Anyone who still claims this week that security, resilience, or digital sovereignty are …