The fact that your infrastructure is using Kubernetes, and the specific version of Kubernetes used is publicly available, and could be used by an attacker to target your environment with known vulnerabilities in the specific version of Kubernetes you are using.
This information could have been obtained from the Kubernetes API /version
endpoint, or from the Kubelet’s /metrics
debug endpoint.
Disable --enable-debugging-handlers
kubelet flag.