Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 598

Kubernetes Cluster Attack

What is Kubernetes Cluster Attack?

Kubernetes Cluster AttackAn intrusion against a Kubernetes (K8s) cluster that abuses exposed APIs, weak RBAC, or vulnerable workloads to gain control of the control plane or worker nodes.


A Kubernetes cluster attack targets the API server, kubelet, etcd, or the workloads themselves to gain code execution, steal secrets, or take over the cluster. Common entry points include exposed kube-apiserver without authentication, exposed kubelet read-write ports, vulnerable admission webhooks, stolen service-account tokens, and overprivileged pods. From an initial foothold, attackers chase paths such as pod-to-node via hostPath or privileged containers, service-account token replay against the API, or abuse of cluster-admin role bindings. Defences include strong RBAC, OIDC-based authentication, network policies, runtime security (Falco, Tetragon), admission controllers like Kyverno or OPA Gatekeeper, and signed, minimal container images.

Examples

  1. 01

    An exposed Kubelet API on port 10250 allows arbitrary exec into pods on the node.

  2. 02

    A leaked service-account token grants list secrets across all namespaces.

Frequently asked questions

What is Kubernetes Cluster Attack?

An intrusion against a Kubernetes (K8s) cluster that abuses exposed APIs, weak RBAC, or vulnerable workloads to gain control of the control plane or worker nodes. It belongs to the Cloud Security category of cybersecurity.

What does Kubernetes Cluster Attack mean?

An intrusion against a Kubernetes (K8s) cluster that abuses exposed APIs, weak RBAC, or vulnerable workloads to gain control of the control plane or worker nodes.

How does Kubernetes Cluster Attack work?

A Kubernetes cluster attack targets the API server, kubelet, etcd, or the workloads themselves to gain code execution, steal secrets, or take over the cluster. Common entry points include exposed kube-apiserver without authentication, exposed kubelet read-write ports, vulnerable admission webhooks, stolen service-account tokens, and overprivileged pods. From an initial foothold, attackers chase paths such as pod-to-node via hostPath or privileged containers, service-account token replay against the API, or abuse of cluster-admin role bindings. Defences include strong RBAC, OIDC-based authentication, network policies, runtime security (Falco, Tetragon), admission controllers like Kyverno or OPA Gatekeeper, and signed, minimal container images.

How do you defend against Kubernetes Cluster Attack?

Defences for Kubernetes Cluster Attack typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Kubernetes Cluster Attack?

Common alternative names include: K8s cluster compromise, Kubernetes intrusion.

Related terms

See also