vulnerability
Kubernetes: CVE-2019-1002100: json-patch requests can exhaust apiserver resources
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Apr 1, 2019 | Apr 16, 2019 | Aug 11, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Apr 1, 2019
Added
Apr 16, 2019
Modified
Aug 11, 2025
Description
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Solutions
kubernetes-upgrade-1_11_8kubernetes-upgrade-1_12_6kubernetes-upgrade-1_13_4
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.