NGINX Vulnerabilities and the Future of Ingress NGINX in Kubernetes
NGINX is a powerful reverse proxy/load balancer that plays a crucial role in managing web traffic and directing it to the appropriate application service for processing. In Kubernetes, Ingress NGINX serves as the traffic controller, efficiently routing traffic to different pods without exposing them directly. This dynamic nature allows Ingress NGINX to adapt to changes within a Kubernetes cluster seamlessly.
However, recent security concerns have surfaced regarding vulnerabilities in older versions of Ingress NGINX. Versions 1.13.7 and below, as well as 1.14.3 and below, are susceptible to these vulnerabilities when installed on a Kubernetes cluster. This has prompted experts to advise administrators to transition to alternative controllers, such as Kubernetes Gateway API, Cilium Ingress, Traefik, or HAProxy Ingress, to ensure robust traffic management.
Furthermore, the impending end of support for Ingress NGINX, set to take effect in March, highlights the urgency for Kubernetes users to make the switch to more secure and reliable traffic management solutions. While newer vulnerabilities like CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514 pose varying levels of risk, the overall security of Ingress NGINX remains a concern following past incidents like the IngressNightmare exploit that exposed cluster secrets and allowed for potential takeovers.