Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-64432

Опубликовано: 07 нояб. 2025
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.

An authentication bypass flaw has been discovered in the KubeVirt management platform. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Multiple complex conditions need to be met in order for this vulnerability to be exploited. Nonetheless, if met, the vulnerability could be exploited by a Pod-Level Attacker to escalate privileges, and manipulate existing virtual machine workloads potentially leading to violation of their Confidentiality, Integrity and Availability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Virtualization 4container-native-virtualization/kubemacpool-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/mtq-controller-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/mtq-lock-server-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/mtq-operator-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/ocp-virt-validation-checkup-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/passt-network-binding-plugin-cni-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9Fix deferred
Red Hat OpenShift Virtualization 4container-native-virtualization/sidecar-shim-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2413422kubevirt.io/kubevirt: KubeVirt Authentication Bypass in Kubernetes Aggregation Layer

EPSS

Процентиль: 4%
0.00016
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
5 месяцев назад

KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.

CVSS3: 4.7
msrc
4 месяца назад

KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer

CVSS3: 4.7
github
5 месяцев назад

KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer

suse-cvrf
4 месяца назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container

suse-cvrf
около 1 месяца назад

Security update for kubevirt

EPSS

Процентиль: 4%
0.00016
Низкий

6.5 Medium

CVSS3