Security for everyone

CVE-2018-18264 Scanner

Detects 'Authentication Bypass' vulnerability in Kubernetes Dashboard affects v. before 1.10.1.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2018-18264 Scanner Detail

Kubernetes Dashboard is an open-source, web-based user interface for Kubernetes clusters. The dashboard provides an overview of the health of the cluster and allows the user to monitor its resources. The dashboard also provides an interface for managing and deploying applications and services within the Kubernetes cluster. In short, it is a powerful tool for managing containerized applications in a Kubernetes environment. 

The CVE-2018-18264 vulnerability is a security flaw discovered in Kubernetes Dashboard before version 1.10.1. The vulnerability allows attackers to bypass authentication and gain access to the dashboard's service account. The consequence of this vulnerability is that attackers can read secrets within the cluster, such as sensitive information such as passwords or secure tokens. The vulnerability can also allow attackers to modify the state of the cluster and cause a breach in the confidentiality and integrity of the data stored on it.

If exploited, the CVE-2018-18264 vulnerability can lead to a complete compromise of the Kubernetes environment. Such an attack can allow an attacker to fully hijack the Kubernetes cluster, which can cause serious reputational and financial damage to the company. In addition, data breaches caused by such attacks can lead to legal consequences due to various data privacy laws in place.

In conclusion, security is a pressing issue in our digital world. With the pro features on, users can easily and quickly learn about vulnerabilities in their digital assets and take proactive steps to secure their environment. Security is no longer optional; it is a necessity for businesses and individuals alike. Knowing about vulnerabilities and taking measures to protect against them can help avoid disastrous consequences.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture