Overview

FieldValue
ID1071
NameManage NetworkPolicies cluster-wide
Risk CategoryNetworkManipulation
Risk LevelCritical
Role TypeClusterRole
API Groupsnetworking.k8s.io
Resourcesnetworkpolicies
Verbscreate, update, patch, delete
TagsDenialOfService LateralMovement NetworkManipulation NetworkPolicyManagement Tampering

Description

Allows creating, modifying, or deleting NetworkPolicies in any namespace. This can be used to disable network segmentation, allow/deny traffic to sensitive pods, or isolate critical components, leading to information disclosure, lateral movement, or denial of service.

Abuse Scenarios

  1. Create a NetworkPolicy to allow all ingress traffic to pods in a namespace.
kubectl create -n <namespace> -f - <<EOF
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: allow-all-ingress
spec:
  podSelector: {} # Selects all pods in the namespace
  policyTypes:
  - Ingress
  ingress:
  - {} # Allows all ingress
EOF
# Example: kubectl create -n production -f - <<EOF ... EOF
  1. Delete a critical NetworkPolicy, removing network segmentation.
kubectl delete networkpolicy <networkpolicy-name> -n <namespace>
# Example: kubectl delete networkpolicy deny-all-ingress -n default