VYPR
Moderate severityNVD Advisory· Published Oct 30, 2023· Updated Jun 12, 2025

Windows kube-proxy LoadBalancer contention

CVE-2021-25736

Description

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
k8s.io/kubernetesGo
< 1.211.21

Affected products

1

Patches

1
b014610de3e5

Merge pull request #99958 from sbangari/winkubeproxylbservicefix

https://github.com/kubernetes/kubernetesKubernetes Prow RobotMar 10, 2021via ghsa
1 file changed · +3 1
  • pkg/proxy/winkernel/proxier.go+3 1 modified
    @@ -410,7 +410,9 @@ func (proxier *Proxier) newServiceInfo(port *v1.ServicePort, service *v1.Service
     	}
     
     	for _, ingress := range service.Status.LoadBalancer.Ingress {
    -		info.loadBalancerIngressIPs = append(info.loadBalancerIngressIPs, &loadBalancerIngressInfo{ip: ingress.IP})
    +		if net.ParseIP(ingress.IP) != nil {
    +			info.loadBalancerIngressIPs = append(info.loadBalancerIngressIPs, &loadBalancerIngressInfo{ip: ingress.IP})
    +		}
     	}
     	return info
     }
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.