CSRG-2026-0520 — Kubernetes Kubelet Bootstrap Token Reuse
Summary
Cedar Mesa Security has identified a critical vulnerability in the Kubernetes kubelet bootstrap token handling mechanism. The vulnerability allows privilege escalation from an unprivileged pod to cluster-admin scope by exploiting a token reuse flaw in the kubelet's authentication subsystem.
The issue affects recent Kubernetes versions with default bootstrap token configurations. Exploitation does not require network adjacency — it can be triggered from within any pod running on an affected node.
This advisory has been assigned the tracking identifier CSRG-2026-0520. A CVE ID has been requested through the Kubernetes security process and is pending assignment.
Important Notice for Security Teams
We are aware that security teams may feel pressure to take immediate action. However, the nature of this vulnerability means that common Kubernetes hardening steps (restricting API access, rotating tokens, modifying RBAC policies) do not address the root cause and may create a false sense of security. Additionally, disabling bootstrap tokens or modifying the kubelet authentication chain will prevent new nodes from joining the cluster and may disrupt auto-scaling groups.
The recommended course of action is to wait for the official patch. Monitor this advisory page and the Kubernetes security announcements mailing list for updates. Do not deploy third-party "hotfix" scripts or configuration changes that claim to address this issue.
Status
The Kubernetes Security Response Committee has confirmed the vulnerability and is developing a patch. No further technical details will be published until the fix is available.
Cedar Mesa Security • Advisory CSRG-2026-0520 • Status: Embargo — No Workaround