Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»Four new vulnerabilities found in Ingress NGINX
    WiFi / Internet & Networking

    Four new vulnerabilities found in Ingress NGINX

    adminBy adminFebruary 6, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    container orchestration, clusters, clustering, Kubernetes
    Share
    Facebook Twitter LinkedIn Pinterest Email

    NGINX is a reverse proxy/load balancer that generally acts as the front-end web traffic receiver and directs it to the application service for data transformation. Ingress NGINX is a version used in Kubernetes as the controller for traffic coming into the infrastructure. It takes care of mapping traffic to pods of containers running jobs without exposing the pods themselves.  Meghu says Ingress NGINX is the primary traffic entry point, and is effective due to its ability to reload its configuration on the fly, allowing it to adjust to changes inside a Kubernetes cluster.

    These vulnerabilities only affect Ingress NGINX versions 1.13.7 and below, and 1.14.3 and below, if they are installed on a Kubernetes cluster.

    The warning comes just weeks before, as announced at KubeCon in November, support for Ingress NGINX ends. Starting in March, the project will no longer receive active maintenance, security patches, or bug fixes.

    Experts have been urging Kubernetes administrators to shift to a new controller ever since. They recommend Kubernetes Gateway API as the standard for traffic management. Meghu notes it is vendor neutral and widely used. Other options are controllers such as Cilium Ingress, Traefik, or HAProxy Ingress.

    In addition to CVE-2026-24512, the other new vulnerabilities are CVE-2026-24513, considered by Meghu a low risk since an attacker needs to have a config containing specific errors to exploit, and CVE-2026-24514, which Meghu considers a medium risk. The controller could be subject to a denial of service if an attacker overwhelms it with requests.

    These are just the most recent issues with Ingress NGINX. Just over a year ago, researchers at Wiz discovered a group of holes dubbed IngressNightmare. They can allow unauthenticated users to inject malicious NGINX configurations and execute malicious code into the Ingress NGINX pod, potentially exposing all cluster secrets and leading to cluster takeover.

    Ingress NGINX Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat 1,000 Businesses Reveal About Marketing Growth in 2026
    Next Article Transform your monitor into a smart TV for just $16
    admin
    • Website

    Related Posts

    Equinix offering targets automated AI-centric network operations

    April 18, 2026

    Data centers are costing local governments billions

    April 18, 2026

    Broadcom’s Facebook friend will help train it to accelerate AI workloads

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    U.S. search ad revenue reached $114.2 billion in 2025

    April 18, 2026

    You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It’s on Sale for Over $200 Off

    April 18, 2026

    Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery

    April 18, 2026

    Critical flaw in Protobuf library enables JavaScript code execution

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,385)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (848)
    • Tech Tools & Mobile / Apps (1,654)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    U.S. search ad revenue reached $114.2 billion in 2025

    April 18, 2026

    You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It’s on Sale for Over $200 Off

    April 18, 2026

    Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery

    April 18, 2026
    Most Popular
    • U.S. search ad revenue reached $114.2 billion in 2025
    • You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It’s on Sale for Over $200 Off
    • Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery
    • Critical flaw in Protobuf library enables JavaScript code execution
    • Dive Into The Stanford Report Data
    • Claude Cowork took one repetitive task for me, and I’m very impressed
    • Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
    • ConnectBot v1.10.4 by Kenny Root
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.