UNCLASSIFIED - NO CUI

Skip to content

chore(findings): kubecost/frontend

Summary

kubecost/frontend has 32 new findings discovered during continuous monitoring.

Layer: opensource/nginx/nginx:1.27.2-distroless is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=kubecost/frontend&tag=prod-2.6.5&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2023-38039 Anchore CVE High curl-7.88.1 0.14797 false
CVE-2024-7264 Anchore CVE Medium curl-7.88.1 0.06460 false
CVE-2024-2398 Anchore CVE High curl-7.88.1 0.01962 false
CVE-2024-2004 Anchore CVE Low curl-7.88.1 0.00910 false
CVE-2023-28320 Anchore CVE Medium curl-7.88.1 0.00641 false
CVE-2024-9681 Anchore CVE Medium curl-7.88.1 0.00571 false
CVE-2023-28322 Anchore CVE Low curl-7.88.1 0.00502 false
CVE-2025-0725 Anchore CVE High curl-7.88.1 0.00460 false
CVE-2023-46218 Anchore CVE Medium curl-7.88.1 0.00444 false
CVE-2024-8096 Anchore CVE Medium curl-7.88.1 0.00412 false
CVE-2025-23419 Anchore CVE Medium nginx-1.27.2 0.00405 false
CVE-2024-11053 Anchore CVE Low curl-7.88.1 0.00337 false
CVE-2023-28319 Anchore CVE High curl-7.88.1 0.00320 false
CVE-2023-28321 Anchore CVE Medium curl-7.88.1 0.00297 false
CVE-2023-46219 Anchore CVE Medium curl-7.88.1 0.00193 false
CVE-2023-27534 Anchore CVE High curl-7.88.1 0.00176 false
CVE-2023-27533 Anchore CVE High curl-7.88.1 0.00141 false
CVE-2024-13176 Anchore CVE Medium openssl-3.0.15 0.00118 false
CVE-2025-53859 Anchore CVE Medium nginx-1.27.2 0.00106 false
CVE-2025-0167 Anchore CVE Low curl-7.88.1 0.00083 false
CVE-2025-9086 Anchore CVE High curl-7.88.1 0.00077 false
CVE-2025-4598 Anchore CVE Medium systemd-252.31-1~deb12u1 0.00053 false
CVE-2025-27587 Anchore CVE Low libssl3-3.0.15-1~deb12u1 0.00035 false
CVE-2025-9230 Twistlock CVE Low openssl-3.0.15-1~deb12u1 0.00026 false
CVE-2025-9230 Anchore CVE High libssl3-3.0.15-1~deb12u1 0.00026 false
CVE-2025-9230 Anchore CVE High openssl-3.0.15 0.00026 false
CVE-2025-9232 Twistlock CVE Low openssl-3.0.15-1~deb12u1 0.00023 false
CVE-2025-9232 Anchore CVE Medium libssl3-3.0.15-1~deb12u1 0.00023 false
CVE-2025-8058 Twistlock CVE Low glibc-2.36-9+deb12u9 0.00010 false
CVE-2025-8058 Anchore CVE Medium libc6-2.36-9+deb12u9 0.00010 false
CVE-2025-4802 Twistlock CVE Low glibc-2.36-9+deb12u9 0.00007 false
CVE-2025-4802 Anchore CVE High libc6-2.36-9+deb12u9 0.00007 false

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=kubecost/frontend&tag=prod-2.6.5&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information