Skip to main content

Unexpected anonymous API call to a Kubernetes cluster

ID:k8s_anonymous_access_anomaly
Data type:Kubernetes
Severity:
Low
-
Medium
MITRE ATT&CK:TA0001:T1190

Description

AlphaSOC detected successful anonymous API calls to a Kubernetes cluster. This indicates that an adversary exploited an exposed Kubernetes API endpoint without authentication, allowing direct interaction with the cluster. Anonymous access bypasses standard security controls and represents a critical security vulnerability in cluster configuration.

Impact

Anonymous access to the Kubernetes API server enables threat actors to enumerate cluster resources, access sensitive data, and potentially execute commands in running containers. Adversaries can exploit this access to deploy malicious workloads, exfiltrate data, or establish persistence in the cluster.

Severity

SeverityCondition
Low
Anonymous API call to a Kubernetes cluster
Medium
Anonymous API call by a client with an unexpected user agent
Medium
Anonymous API call by a client IP within an unexpected ASN
Medium
Anonymous API call by a client accompanied by an unexpected action
Medium
Anonymous API call by a client within unexpected Kubernetes namespace

Investigation and Remediation

Review Kubernetes audit logs to identify specific API calls and affected resources. Check API server configuration for authentication and authorization settings. Ensure RBAC policies restrict anonymous access. Configure network policies to limit API server exposure. Rotate any compromised credentials and secrets. Monitor for unauthorized workload deployments or configuration changes.

Known False Positives

  • Kubernetes readiness/liveness probes