EresusSecurity
Back to Research
Platform Exploits

Account Hijacking and Internal Network Attacks in Kubeflow

Yiğit İbrahim SağlamOffensive Security Specialist
September 14, 2024
1 min read

Overview

Kubeflow often runs high-privilege notebooks. An unauthenticated API bypass or Server-Side Request Forgery (SSRF) present in MLflow / Kubeflow can give attackers full access to the underlying Kubernetes nodes and cloud metadata service (IMDS).

Remediation

Implement strict OIDC authentication for Kubeflow. Block container access to cloud IMDS endpoints via NetworkPolicies.

Security Validation

Have you tested this risk in your own system?

Eresus Security delivers real exploit evidence through penetration testing, AI agent security, and red team operations.

Request a pilot test