CSRG-2026-0519 — Kubernetes Kubelet Certificate Rotation Privilege Escalation

Embargo Notice: Full technical details for this advisory are being withheld pending coordinated disclosure with the Kubernetes Security Response Committee. This page will be updated with complete vulnerability details, affected versions, CVSS scoring, and remediation guidance when the embargo lifts.

Summary

Cedar Mesa Security has identified a critical vulnerability in the Kubernetes kubelet certificate rotation mechanism. The vulnerability allows privilege escalation from a compromised node to cluster-admin scope through the kubelet's TLS certificate lifecycle.

The issue affects recent Kubernetes versions using the default certificate rotation configuration. Exploitation requires network adjacency to an affected node during the certificate renewal window.

This advisory has been assigned the tracking identifier CSRG-2026-0519. A CVE ID has been requested through the Kubernetes security process and is pending assignment.

Status

The Kubernetes Security Response Committee has been notified and has acknowledged receipt of the vulnerability report. Patch development is underway. No further technical details will be published until a fix is available in supported Kubernetes release branches.

Cedar Mesa Security • Advisory CSRG-2026-0519 • Status: Embargo