Skip to main content

Overview

The Kubernetes Scanner detects security misconfigurations and vulnerabilities in Kubernetes clusters. It scans for Kubernetes-specific services and runs both passive and active detection methods to identify security issues. The Kubernetes Scanner is a vulnerability scanner: it actively tests Kubernetes clusters for security weaknesses. It does not add data to your Attack Surface. Identified vulnerabilities are reported as findings.

Supported targets

Target typeExamples
IP address192.168.1.1, 10.0.0.5
Hostnamek8s.example.com, api.cluster.local

Scan types

ModeDescriptionUse case
LightFast scan with passive detectionQuick reconnaissance
DeepComprehensive scan with active detectionFull security audit
CustomUser-configured ports and optionsTargeted testing

Parameters comparison

ParameterLightDeepCustom
Ports scanned~11~100User-defined
Check aliveConfigurable
Passive detections
Active detectionsConfigurable
Authentication

Detection methods comparison

DetectionLightDeepCustom
Service fingerprinting
Version detection
Configuration enumeration
Exposed API detection
Vulnerability exploitationConfigurable
Privilege escalation testingConfigurable
Container escape checksConfigurable
RBAC enumerationConfigurable
The Deep scan performs active detection methods that may exploit vulnerabilities to discover additional issues. Only run these against systems you have explicit authorization to test.

Custom scan

Full control over scan parameters:
  • Define custom port ranges, lists, or common port presets
  • Enable or disable active detection methods
  • Configure authenticated scanning with service account tokens

Custom scan options

Port selection

OptionPorts scannedDescription
Top 10 ports~11Most common Kubernetes service ports
Top 100 ports~100Extended list of common ports
Top 1000 ports~1,000Comprehensive port coverage
Top 5000 ports~5,000Extensive port scan
All65,535Full port range
RangeVariableCustom port range (e.g., 6443-10250)
ListVariableComma-separated list of specific ports
The “Top X ports” presets are curated lists of ports commonly used by Kubernetes services. The actual port count may differ from the preset name.
See Port lists for the exact ports covered by each preset.

Additional options

OptionDescriptionDefault
Check aliveVerify the host is reachable before scanningEnabled
Active detectionsEnable active detection methodsEnabled in Deep
If the scanner shows zero open ports but you know ports are open, try disabling “Check alive”. Some hosts don’t respond to ICMP requests used for host discovery.

Passive detections

Non-intrusive checks that identify exposed services and misconfigurations without exploiting them. Available in all scan modes.

Service fingerprinting

Identifies Kubernetes-related services running on open ports by analyzing service banners and response patterns. Detects API servers, kubelet, etcd, dashboards, and other components.

Version detection

Extracts version information from identified services to determine the Kubernetes distribution and version. Used to check for known vulnerabilities affecting specific versions.

Configuration enumeration

Queries accessible endpoints to gather configuration details without authentication. Identifies insecure defaults, exposed metrics endpoints, and debug interfaces.

Exposed API detection

Checks if Kubernetes APIs (API server, kubelet, etcd) are accessible without authentication or with anonymous access enabled. Identifies critical exposure risks.

Active detections

More thorough checks that exploit found vulnerabilities to discover additional issues. Only available in Deep and Custom scan modes.

Vulnerability exploitation

Attempts to exploit detected vulnerabilities to confirm they are exploitable and to discover additional issues that may be accessible through the initial vulnerability.

Privilege escalation testing

Tests for paths that could allow an attacker to escalate privileges within the cluster. Checks for overly permissive RBAC roles, hostPath mounts, and privileged containers.

Container escape checks

Tests for container escape vectors including privileged mode, host namespace sharing, dangerous capabilities, and kernel vulnerabilities that could allow breaking out of containers.

RBAC enumeration

Enumerates Role-Based Access Control configurations to identify overly permissive roles, dangerous bindings, and potential privilege escalation paths through RBAC misconfigurations.

What it detects

CategoryExamples
Exposed APIsKubernetes API server, kubelet API, etcd
Dashboard exposureUnauthenticated Kubernetes Dashboard access
RBAC issuesMisconfigured role bindings, excessive permissions
Service account issuesDefault service account tokens, mounted secrets
Container vulnerabilitiesEscape vectors, privileged containers
Network policiesMissing or misconfigured network segmentation

Authentication

Provide a service account token to simulate an authenticated adversary. This reveals:
  • Internal misconfigurations not visible externally
  • What an attacker with valid credentials could access
  • Privilege escalation paths within the cluster
The service account token must be a valid JWT in the format: header.payload.signature
Authenticated scanning is only available in Deep and Custom scan modes. See Authenticated scanning for configuration details.

How it works

Our Kubernetes scanning engine is based on kube-hunter. We started with this engine, improved its accuracy and detection methods, and integrated them into our product. The scanner executes these steps:
  1. Host discovery: Checks if the target is alive (optional)
  2. Port scanning: Scans for Kubernetes-specific ports using Nmap
  3. Service detection: Identifies Kubernetes services on open ports
  4. Passive detection: Fingerprints services and enumerates configurations
  5. Active detection: Exploits vulnerabilities to find additional issues (Deep/Custom)
  6. Reporting: Generates findings with severity and remediation guidance

Follow-up actions

After identifying Kubernetes vulnerabilities:
  • Restrict API access: Implement network policies and authentication
  • Review RBAC: Apply principle of least privilege
  • Secure the dashboard: Disable or require authentication
  • Audit service accounts: Remove unnecessary permissions
  • Run Network Scanner: Test the underlying infrastructure
  • Run Cloud Scanner: Check cloud provider configurations
  • Run Port Scanner: Discover additional exposed services