This blog details the ability of Google’s Security Command Center (SCC) to detect the execution of the IngressNightmare vulnerability chain affecting Kubernetes Ingress Nginx Controllers, which was discovered by Wiz. Successful exploitation of CVE-2025-1974 can result in remote code execution. Exploitation of this vulnerability can be detected by SCC’s Container Threat Detection, which is a built-in service that continuously evaluates all changes and remote access attempts to detect runtime attacks in Google Kubernetes Engine (GKE) in near-real time. This blog will also touch on how to identify if your clusters are using ingress-nginx.
Recently disclosed vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and critically, CVE-2025-1974 with a CVSS score of 9.8) within ingress-nginx, a widely adopted Kubernetes Ingress controller, present a significant risk. These vulnerabilities could allow malicious actors to execute arbitrary code within the ingress-nginx controller, potentially leading to the exposure of sensitive Kubernetes Secrets. Ingress-nginx is not installed by default in GKE so customers aren’t vulnerable by default.
To take advantage of this vulnerability, an attacker would need to upload a shared library to the target pod, taking advantage of NGINX Client Body Buffering to keep the file available for execution. Then they would send an AdmissionReview request with a maliciously crafted "ssl_engine load_module" annotation to the NGINX admission controller, which would trigger the loading of the previously uploaded shared library. Lastly, the attacker would need to locate the shared library using the file descriptor reference from the /proc filesystem (by searching in /proc/*/fd/**) in order to trigger its execution.
By focusing on the most critical CVE (CVE-2025-1974 with a CVSS of 9.8), this exploit can be detected by monitoring nginx execution with arguments that include references to the /proc filesystem by the ingress-nginx container.
Security Command Center Premium and Enterprise customers who have the Container Threat Detection service enabled, have coverage for this scenario via the detection Execution: IngressNightmare Vulnerability Exploitation.
The detection is off by default so customers need to enable it by following our guide for module enablement to enable the detector at the desired level (organization, folder or project) which is dependent on your Security Command Center entitlement.
More specifically, customers can run this command line to enable the detector at a project level:
PROJ_NUM=<Project number >
gcloud alpha scc settings services modules enable \
--service=CONTAINER_THREAT_DETECTION \
--module=INGRESS_NIGHTMARE_VULNERABILITY_EXPLOITATION \
--project=${PROJ_NUM}