A newly disclosed vulnerability in the Kubernetes C# client has been assigned CVE-2025-9708 with a CVSS score of 6.8 (Medium severity). The flaw stems from improper certificate validation in custom Certificate Authority (CA) mode, creating the risk of man-in-the-middle (MITM) attacks and API impersonation.
According to the advisory, “A vulnerability exists in the Kubernetes C# client where the certificate validation logic accepts properly constructed certificates from any Certificate Authority (CA) without properly verifying the trust chain. This flaw allows a malicious actor to present a forged certificate and potentially intercept or manipulate communication with the Kubernetes API server.”
The issue impacts organizations using the Kubernetes C# client to connect to a Kubernetes API server over TLS/HTTPS with custom CA certificates in the kubeconfig file.
The advisory makes clear: “You are vulnerable if you use the Kubernetes C# client to connect to a Kubernetes API server over TLS/HTTPS with custom CA certificates in your kubeconfig file and your connection occurs over an untrusted network.”
All versions prior to v17.0.14 are affected.
By exploiting this flaw, an attacker could craft a forged certificate signed by any CA and present it to the client. Because the trust chain is not properly verified, the client may accept the certificate as valid. This opens the door to:
- MITM attacks, where sensitive API communications can be intercepted or altered.
- API server impersonation, allowing attackers to send unauthorized commands or harvest sensitive data.
In environments where Kubernetes clusters are managed over public or untrusted networks, the risk is particularly high.
The vulnerability has been patched in Kubernetes C# client v17.0.14 and above. Organizations are urged to upgrade as soon as possible.
For those unable to patch immediately, the advisory offers temporary mitigations:
“Moving the CA certificates into the system trust store instead of specifying them in the kubeconfig file. Note: This approach may introduce new risks, as all processes on the system will begin to trust certificates signed by that CA.”
Alternatively, disable custom CA in kubeconfig and add the CA to the machine’s trusted root store.
To assess exposure, security teams should:
- Review Kubernetes client applications and inspect certificate validation logic.
- Examine kubeconfig files for use of a custom CA certificate in the certificate-authority field.
- Monitor client logs for unexpected or untrusted certificate connections.