Privileged Escalation in Kubernetes Gateway API.

Jan 18, 2022

Disclosure Details
CVSS Impact Score4.7 AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Affected Releases1.12.0 to 1.12.1



Istio version 1.12.0 and 1.12.1 are vulnerable to a privilege escalation attack. Users who have CREATE permission for objects can escalate this privilege to create other resources that they may not have access to, such as Pod.

Am I Impacted?

This vulnerability impacts only an Alpha level feature, the Kubernetes Gateway API. This is not the same as the Istio Gateway type (, which is not vulnerable.

Your cluster may be impacted if: * You have the Kubernetes Gateway CRD installed. This can be detected with kubectl get crd * You have not set the PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER=false environment variable in Istiod (this is defaulted to true). * Untrusted users have CREATE permissions for objects.


If you are unable to upgrade, any of the following will prevent this vulnerability:


We would like to thank Anthony Weems.