{"id":"AZL-31696","summary":"CVE-2020-8554 affecting package python-kubernetes for versions less than 21.7.0-1","details":"Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.","modified":"2026-04-01T05:10:21.292503Z","published":"2021-01-21T17:15:13Z","upstream":["CVE-2020-8554"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8554"}],"affected":[{"package":{"name":"python-kubernetes","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/python-kubernetes"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.7.0-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-31696.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}