top of page
perceptive_background_267k.jpg

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.17.2 and 1.16.4, an unchecked type assertion in the `forEac…

Published:

23 april 2026 om 22:00:00

Alert date:

24 april 2026 om 15:07:56

Source:

nvd.nist.gov

Click to open the original link from this advisory

Cloud & Virtualization, Security Tools

A vulnerability in Kyverno policy engine versions prior to 1.17.2 and 1.16.4 allows users with policy creation permissions to crash the cluster-wide background controller through an unchecked type assertion in the forEach mutation handler. The bug causes persistent CrashLoopBackOff states and blocks resource operations by dropping admission controller connections. The vulnerability affects only the legacy engine, while CEL-based policies remain unaffected. The crash loop continues until the malicious policy is deleted, making it a significant availability threat for Kubernetes clusters using Kyverno.

Technical details

Mitigation steps:

Affected products:

Kyverno

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page