Home

Description

This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server. In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack

PUBLISHED Reserved 2025-07-23 | Published 2025-10-30 | Updated 2025-10-30 | Assigner suse




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Problem types

CWE-295: Improper Certificate Validation

Product status

Default status
unaffected

5.3.0 (semver) before 5.3.5
affected

5.4.0 (semver) before 5.4.7
affected

0.0.0-20230727023453-1c4957d53911 (semver) before 0.0.0-20251020133207-084a437033b4
affected

References

bugzilla.suse.com/show_bug.cgi?id=CVE-2025-54470

github.com/...vector/security/advisories/GHSA-qqj3-g7mx-5p4w

cve.org (CVE-2025-54470)

nvd.nist.gov (CVE-2025-54470)

Download JSON