CrowdStrike’s Post

IngressNightmare: New Kubernetes vulnerabilities are here—and they’re serious. On March 24, a set of high and critical vulnerabilities were disclosed in the widely used Kubernetes ingress-nginx controller. Left unaddressed, they open the door to remote code execution, lateral movement, and full cluster compromise. 🔍 In our latest blog, CrowdStrike engineers break down: - What IngressNightmare is and why it matters - How these CVEs work together in an attack chain - How the CrowdStrike Falcon platform detects exploitation and blocks subsequent payload detonation attempts in real time Read how we’re protecting customers from this emerging cloud-native threat → https://lnkd.in/gGpwwMUG

  • No alternative text description for this image
KayVon Nejad

Helping CIOs, CISOs & MSPs Cost-Effectively Implement Enterprise-Grade XDR & MDR | 24/7 Streamlined Security Operations | SOC | SIEM | EDR | NDR | CSPM | mXDR | Cloud Security

3d

Yikes, IngressNightmare sounds intense! Thanks for the breakdown and the quick response, CrowdStrike. It's reassuring to know you're on top of these critical Kubernetes vulnerabilities and providing real-time protection.

Like
Reply
Zhiyong Fang

Software QA Engineer at Configit

1w

Thanks for the message. It is worth to check for all production environments. And it can be also worth to do hand on, injection and remote execution.

See more comments

To view or add a comment, sign in

Explore topics