![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1174 – [minikube] Network Port exposure in minikube running on macOS using Docker driver
https://notcve.org/view.php?id=CVE-2023-1174
24 May 2023 — This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container. • https://groups.google.com/g/kubernetes-security-announce/c/2ZkJFMDTKbM • CWE-266: Incorrect Privilege Assignment •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1944 – [minikube] ssh server with default password
https://notcve.org/view.php?id=CVE-2023-1944
24 May 2023 — This vulnerability enables ssh access to minikube container using a default password. • https://github.com/kubernetes/minikube • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-1002103
https://notcve.org/view.php?id=CVE-2018-1002103
05 Dec 2018 — In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem. En Minikube 0.3.0-0.29.0, minikube expone el Dashboard de Kubernetes escuchando en la IP VM en el puerto... • https://github.com/kubernetes/minikube/issues/3208 • CWE-352: Cross-Site Request Forgery (CSRF) •