Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Critical Bugs in Chaos Mesh Enable Cluster Takeover
Uncategorized

Critical Bugs in Chaos Mesh Enable Cluster Takeover

Staff WriterBy Staff WriterSeptember 16, 2025No Comments6 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Vulnerability Discovery: JFrog researchers uncovered four critical vulnerabilities, dubbed "Chaotic Deputy," in Chaos Mesh that allow attackers to potentially take over entire Kubernetes clusters.

  2. Critical Security Risks: Three of these vulnerabilities (CVE-2025-59360, CVE-2025-59361, CVE-2025-59359) enable command injection, granting attackers the ability to execute arbitrary OS commands across pods, thereby escalating their privileges.

  3. Patch Available: JFrog reported these issues, leading to a software repair (version 2.7.3) released on August 21; organizations using Chaos Mesh are urged to update immediately.

  4. Target for Attackers: Chaos engineering tools like Chaos Mesh, designed for fault injection, can also present high-value targets for adversaries due to their inherent access to entire Kubernetes clusters.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Critical Bugs in Chaos Mesh Enable Cluster Takeover’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

Chaos engineering platforms, which organizations use to introduce controlled failures and test system resilience, can be broken into and used to carry out real-world attacks.

Such is the case with a set of four serious vulnerabilities that researchers at JFrog recently discovered in Chaos Mesh that give attackers a way to take over entire Kubernetes clusters.

Chaotic Deputy Vulnerabilities

Chaos Mesh lets organizations inject fault scenarios into Kubernetes environments to test the robustness of pods, networks, and other components and to help identify potential weak spots. The cloud-native, open source platform is an incubating project within the Cloud Native Computing Foundation (CNCF), a designation that signals its adoption, stability, and readiness for production environments.

JFrog decided to investigate Chaos Mesh because of its ability to simulate faults across entire Kubernetes clusters. The company’s analysis focused on a component called Chaos Controller Manager, which handles the scheduling and execution of chaos experiments. The component includes different controllers, like a Workflow Controller, Scheduler Controller, and other fault-specific controllers, that work together to run and manage chaos experiments. The complexity of Chaos Controller Manager and the fact that it lacked any official documentation on how it worked in turn prompted JFrog researchers to inspect it for vulnerabilities.

Related:SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management

Their analysis unearthed not just one, but four separate vulnerabilities, which they have collectively dubbed “Chaotic Deputy.”

JFrog assessed three of the vulnerabilities — CVE-2025-59360, CVE-2025-59361, and CVE-2025-59359 — as critical (CVSS 9.8). All three are command injection flaws that allow an attacker with initial access to a Kubernetes cluster to execute arbitrary OS commands on any pod within the cluster. The security vendor found the flaws facilitating access to Kubernetes service tokens across multiple pods, which an attacker — even someone running within an unprivileged pod — could then use to escalate privileges and potentially take over an entire Kubernetes cluster. JFrog tied the vulnerabilities to cleanTcs, (a fault injection for testing system resiliency) that did not properly sanitize user input.

The other Chaotic Deputy vulnerability that JFrog discovered — CVE-2025-59358 (CVSS 7.5) — is relatively less severe and enables an attacker to trigger a denial-of-service condition across an entire cluster.

A Very Attractive Target

“Platforms such as Chaos Mesh give, by design, dangerous API privileges to certain pods that in cases of abuse can gain complete control of the Kubernetes cluster,” JFrog application security researcher Natan Nehorai wrote in JFrog’s advisory. “This potential abuse can become a critical risk when vulnerabilities such as Chaotic Deputy are discovered.”

Related:F5 to Acquire CalypsoAI for Advanced AI Security Capabilities

JFrog reported the vulnerabilities to the Chaos Mesh development team in early May and a repaired software version (2.7.3) became available Aug. 21. JFrog recommends that organizations using the technology upgrade to the new version as soon as possible. The security vendor’s advisory contains a workaround for those that cannot do so immediately.

Chaos Mesh is one of several chaos engineering tools that let organizations safely break their systems to test resilience. Other options such as LitmusChaos and Gremlin also allow organizations to do the same thing by simulating pod failures, network disruptions, and resource stress.  

The goal in using these tools is to spot hidden security weaknesses and test recovery plans in a proactive and controlled manner. But they can also be attractive to adversaries looking for a way into a target network. “The problem with chaos engineering platforms is that, by design, they have access to the entire cluster, at least for fault injection,” Shachar Menashe, vice president of security research at JFrog, says in comments to Dark Reading. “So, they are in fact a very high value target for attackers.”

Related:Southeast Asian Scam Centers Face More Financial Sanctions

JFrog is in the process of disclosing similar flaws in other chaos engineering platforms and will publish information after the coordinated disclosure process ends, Menashe says.

The Chaotic Deputy flaws that JFrog reported to Chaos Mesh require attackers to have prior access to a Kubernetes cluster. But such access happens pretty commonly, Menashe says. Attackers can usually gain a foothold since there are WAN-facing pods in a Kubernetes cluster. “These pods can be susceptible to [remote code execution] or [server side request forgery] vulnerabilities, which would give attackers a foothold in the cluster,” he says. “The recommendation is to monitor the security of WAN-facing pods much more closely,” using SCA and SAST analysis and penetration testing.

When procuring a chaos engineering platform, it’s a good idea to look at its supplied API. It’s also wise to ensure the platform doesn’t support running code on arbitrary pods as a feature. Instead, Menashe says, any fault injection for testing system resilience should only produce a denial-of-service condition.

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Discover More Technology Insights

Dive deeper into the world of Cryptocurrency and its impact on global finance.

Explore past and present digital transformations on the Internet Archive.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple Seals Security Gaps in Latest Software Update for iPhone, iPad, and Mac
Next Article Why Real-Time Threat Intelligence Is a Must for Modern SOCs
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Comments are closed.

Latest Posts

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 2026

AI’s Rapid Rise in Detecting and Exploiting Security Flaws

January 30, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges
  • AXA XL Unveils Dedicated Team for Alternative Risk Solutions
  • Guarding the Future: Securing AI Application Supply Chains
  • Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness
  • Torq Elevates SOCs with AI-Driven Hyper Automation
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.