Helm Charts Flaw Could Let Hackers Access Kubernetes Clusters, Microsoft Finds

Default Helm charts for Kubernetes may expose clusters to attacks, Microsoft warns. Misconfigurations risk data leaks, code execution, and takeovers.

Written By: Aminu Abdullahi
May 6, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

If you’ve ever used pre-made Helm charts to quickly set up applications in Kubernetes, you might want to double-check your security settings. 

Microsoft has warned that using default Helm charts to deploy Kubernetes applications can expose organizations to cyberattacks. The tech giant’s Defender for Cloud team found that popular “out-of-the-box” templates often sacrifice security for ease of use, opening the door to unauthorized data access, code execution, and full cluster compromise.

“While these ‘plug-and-play’ options greatly simplify the setup process, they often prioritize ease of use over security,” said Michael Katchinskiy and Yossi Weizman, security researchers from Microsoft Defender for Cloud, in a blog post. “As a result, a large number of applications end up being deployed in a misconfigured state by default, exposing sensitive data, cloud resources, or even the entire environment to attackers.”

Real-world risks from templates

Helm charts are widely used for their speed and convenience. However, Microsoft’s research highlights a worrying trend: many of these templates, especially from open-source repositories, lack critical security controls by default.

One of the most alarming cases involved Apache Pinot, a distributed database used for real-time analytics. Microsoft discovered that Pinot’s official Helm chart exposes its primary services (pinot-broker and pinot-controller) to the public internet via Kubernetes LoadBalancer services. Worse still, authentication is not enabled by default.

“Recently, Microsoft Defender for Cloud identified several incidents in which attackers exploited misconfigured Apache Pinot workloads, allowing them to access the data of Apache Pinot users,” the researchers noted.

Meshery and Selenium Grid are also in the crosshairs

Meshery, a platform for managing cloud-native infrastructure, was another critical example. When installed using its official Helm chart, Meshery exposes its interface via an external IP address and lets anyone register a new user. This effectively allows outsiders to monitor cluster metrics and even deploy new pods.

“This isn’t just about data leaks,” warned Yossi Weizman. “Attackers who register as users can deploy malicious workloads, escalating privileges to take full control of nodes,” he told GBHackers.

Meanwhile, Selenium Grid, a widely used browser testing tool, was vulnerable due to third-party GitHub templates that exposed it through NodePort or LoadBalancer services.

“The combination of no authentication and internet exposure is catastrophic,” Michael Katchinskiy told GBHackers. “It turns a testing tool into a gateway for cluster takeover.”

How to stay protected

Microsoft recommends:

  • Review Helm charts before deploying, don’t assume defaults are safe.
  • Enforce authentication, even for internal services.
  • Scan for exposed services, and regularly check if any workloads are unintentionally public.
  • Monitor for suspicious activity, like unexpected user sign-ups or strange pod deployments.

While Helm charts make Kubernetes deployments faster, blindly trusting default settings can leave your data and entire cluster vulnerable. As cloud attacks rise, taking a few extra minutes to lock down configurations could save a major breach later.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

AI Agents Vulnerable to ‘Silent Hijacking,’ Security Researchers Warn

Researchers reveal zero-click exploits that let hackers hijack AI agents from OpenAI, Microsoft, and Google to steal data and disrupt workflows.

Aminu Abdullahi
Aug 15, 2025
Cybersecurity Budget Growth Hits Five-Year Low as Economic Pressures Mount

Cybersecurity spending growth slowed to just 4% in 2025—the lowest in five years—raising concerns about underfunded teams facing increasingly sophisticated threats.

Aminu Abdullahi
Aug 13, 2025
Inside Microsoft’s Real-Time War Against Cybersecurity Threats

At Black Hat 2025, Microsoft revealed how its security teams work in real time to outpace hackers and stop attacks before they escalate.

Matt Gonzales
Aug 9, 2025
Black Hat 2025: What Keeps Cyber Experts Up at Night?

TechnologyAdvice’s Matt Gonzales interviewed cyber experts at Black Hat 25 about the topics they’re watching most closely. The topics include AI, deepfakes, and human error.

Matt Gonzales
Aug 9, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.