#NeuVector
CVE-2025-54470 - NeuVector telemetry sender is vulnerable to MITM and DoS
CVE ID : CVE-2025-54470

Published : Oct. 30, 2025, 10:15 a.m. | 1 hour, 10 minutes ago

Description : This vulnerability affects NeuVector deployments only when the Report anonymous cluster data opt...
CVE-2025-54470 - NeuVector telemetry sender is vulnerable to MITM and DoS
This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server. In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a …
cvefeed.io
October 30, 2025 at 12:19 PM
New CVE Alert 🚨
CVE-2025-54470
There's a security issue, **CVE-2025-54470**, for NeuVector users who send anonymous usage data. This means your system might not properly secure this information as it's sent, allowing someone to secretly snoop on or alter it. Attackers could also send too much ba...
October 30, 2025 at 11:52 AM
CVE-2025-54471 - NeuVector is shipping cryptographic material into its binary
CVE ID : CVE-2025-54471

Published : Oct. 30, 2025, 10:15 a.m. | 1 hour, 10 minutes ago

Description : NeuVector used a hard-coded cryptographic key embedded in the source
code. At compilation t...
CVE-2025-54471 - NeuVector is shipping cryptographic material into its binary
NeuVector used a hard-coded cryptographic key embedded in the source code. At compilation time, the key value was replaced with the secret key value and used to encrypt sensitive configurations when NeuVector stores the data.
cvefeed.io
October 30, 2025 at 11:50 AM
CVE-2025-54469 - NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow
CVE ID : CVE-2025-54469

Published : Oct. 30, 2025, 10:15 a.m. | 1 hour, 10 minutes ago

Description : A vulnerability was identified in NeuVector, where the enforcer used environmen...
CVE-2025-54469 - NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow
A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitising their values. The entry process of the enforcer container is the monitor process. When the enforcer container stops, the monitor process checks whether …
cvefeed.io
October 30, 2025 at 11:43 AM
🚨 SUSE NeuVector CRITICAL OS command injection (CVSS 9.9): Unsanitized env vars let attackers run arbitrary commands. Patch immediately & restrict env var access. Affects 5.3.0, 5.4.0. More: https://radar.offseq.com/threat/cve-2025-54469-cwe-78-improper-neutralization-of-s-36f98e7b #OffSeq #SUSE ...
October 30, 2025 at 10:32 AM
NeuVector telemetry sender is vulnerable to MITM and DoSThis vulnerability af... This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When...

Origin | Interest | Match
CVE-2025-54470 | THREATINT
CVE-2025-54470: This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server. In affected versions, NeuVector does not enforce TLS c...
cve.threatint.eu
October 30, 2025 at 10:28 AM
コンテナ保護基盤「NeuVector」に複数脆弱性 - 「クリティカル」も

コンテナ化されたアプリケーションやKubernetes環境を保護するセキュリティプラットフォーム「NeuVector」に複数の脆弱性が明らかとなった。「クリティカル」とされる脆弱性も含まれる。

「Enforcer」コンポーネントでは、一部環境変数を処理する際に検証処理が欠如しており、コマンドインジェクションが可能となる「CVE-2025-54469」が明らかとなった。

共通脆弱性評価システム「CVSSv3.1」のベーススコアは、最高値となる「10.0」とされており、重要度は4段階中もっとも高い「クリティカル...
【セキュリティ ニュース】コンテナ保護基盤「NeuVector」に複数脆弱性 - 「クリティカル」も(1ページ目 / 全1ページ):Security NEXT
コンテナ化されたアプリケーションやKubernetes環境を保護するセキュリティプラットフォーム「NeuVector」に複数の脆弱性が明らかとなった。「クリティカル」とされる脆弱性も含まれる。 :Security NEXT
www.security-next.com
October 25, 2025 at 5:44 AM
【セキュリティ ニュース】コンテナ保護基盤「NeuVector」に複数脆弱性 - 「クリティカル」も(1ページ目 / 全1ページ):Security NEXT https://www.security-next.com/176166
October 23, 2025 at 5:44 AM
Critical NeuVector RCE Flaw (CVE-2025-54469, CVSS 10.0) Allows Command Injection via Unsanitized Environment Variables
Critical NeuVector RCE Flaw (CVE-2025-54469, CVSS 10.0) Allows Command Injection via Unsanitized Environment Variables
SUSE patched a Critical RCE flaw (CVE-2025-54469, CVSS 10.0) in NeuVector Enforcer that allows attackers to inject commands via unsanitized environment variables, risking container root shell access.
securityonline.info
October 23, 2025 at 1:42 AM
NeuVector в современной Kubernetes-инфраструктуре: почему мы не рекомендуем его для production Недавно мы реализовали ин...

#neuvector #falco #trivy #security #IDS #IPS #иб #deckhouse #kubernetes #platform #dkp

Origin | Interest | Match
September 30, 2025 at 7:09 AM
CVE-2025-53884 - NeuVector has an insecure password storage vulnerable to rainbow attack
CVE ID : CVE-2025-53884

Published : Sept. 17, 2025, 1:15 p.m. | 1 hour, 44 minutes ago

Description : NeuVector stores user passwords and API keys using a simple, unsalted hash. This ...
CVE-2025-53884 - NeuVector has an insecure password storage vulnerable to rainbow attack
NeuVector stores user passwords and API keys using a simple, unsalted hash. This method is vulnerable to rainbow table attack (offline attack where hashes of known passwords are precomputed).
cvefeed.io
September 17, 2025 at 3:23 PM
You can now share your thoughts on vulnerability CVE-2025-53884 in Vulnerability-Lookup:
https://vulnerability.circl.lu/vuln/CVE-2025-53884

SUSE - neuvector

#vulnerabilitylookup #vulnerability #cybersecurity #bot
cvelistv5 - CVE-2025-53884
Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.
vulnerability.circl.lu
September 17, 2025 at 1:22 PM
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password

pdf-parser: All Streams Didier released a new version of pdf-parser.py.
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password
pdf-parser: All Streams Didier released a new version of pdf-parser.py.
isc.sans.edu
September 2, 2025 at 3:45 AM
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password
https://isc.sans.edu/podcastdetail/9594
September 2, 2025 at 2:00 AM
コンテナセキュ基盤「NeuVector」に脆弱性 管理者パスワードの変更を

コンテナセキュリティプラットフォーム「NeuVector」に複数の脆弱性が明らかとなった。乗っ取りが可能となる深刻な脆弱性も判明しており、アップデートで修正されている。

あわせて3件の脆弱性が明らかとなったもの。「CVE-2025-8077」は、管理者アカウントの初期パスワードが固定値となっている脆弱性。そのまま利用していた場合、同一クラスタ内のワークロードから認証トークンを取得でき、API経由であらゆる操作が可能となる。

またプロセス違反によりコマンドが終了した際、コマンドライン引数にパスワードを含む場合...
【セキュリティ ニュース】コンテナセキュ基盤「NeuVector」に脆弱性 管理者パスワードの変更を(1ページ目 / 全1ページ):Security NEXT
コンテナセキュリティプラットフォーム「NeuVector」に複数の脆弱性が明らかとなった。乗っ取りが可能となる深刻な脆弱性も判明しており、アップデートで修正されている。 :Security NEXT
www.security-next.com
September 1, 2025 at 1:17 PM
【セキュリティ ニュース】コンテナセキュ基盤「NeuVector」に脆弱性 管理者パスワードの変更を(1ページ目 / 全1ページ):Security NEXT https://www.security-next.com/173985
September 1, 2025 at 11:05 AM
CVE-2025-8077 (CVSS 9.8): CRITICAL Flaw in NeuVector Exposes Kubernetes Clusters to Full Takeover
CVE-2025-8077 (CVSS 9.8): CRITICAL Flaw in NeuVector Exposes Kubernetes Clusters to Full Takeover
A critical flaw in NeuVector (CVE-2025-8077) allows attackers to bypass authentication with a hardcoded password, exposing Kubernetes clusters to full compromise.
securityonline.info
September 1, 2025 at 4:50 AM
CVE-2025-8077 (CVSS 9.8): CRITICAL Flaw in NeuVector Exposes Kubernetes Clusters to Full Takeover
CVE-2025-8077 (CVSS 9.8): CRITICAL Flaw in NeuVector Exposes Kubernetes Clusters to Full Takeover
securityonline.info
September 1, 2025 at 1:54 AM
SUSE Certified Administrator in SUSE NeuVector 5: Mastering Container Security

SUSE NeuVector 5 provides full lifecycle container security for Kubernetes environments, integrating runtime security, zero-trust controls, and supply chain security. This certification validates expertise in deploying…
SUSE Certified Administrator in SUSE NeuVector 5: Mastering Container Security
SUSE NeuVector 5 provides full lifecycle container security for Kubernetes environments, integrating runtime security, zero-trust controls, and supply chain security. This certification validates expertise in deploying and securing containerized workloads in production. You Should Know: 1. Key NeuVector Features Runtime Security: Real-time threat detection and blocking. Zero-Trust Network Policies: Enforce least-privilege access. Vulnerability Scanning: Continuously monitor container images. Compliance Checks: Ensure adherence to CIS benchmarks.
undercodetesting.com
May 31, 2025 at 11:33 PM
The latest update for #Rancher includes "Stop Guessing, Start Measuring: Optimizing Rancher Continuous Delivery With Fleet Benchmarks" and "Shut Down Cryptojackers and Strengthen #Kubernetes Security with NeuVector".

#devops #cloud https://opsmtrs.com/3gHLLeQ
Rancher
Rancher is a complete software stack for teams adopting containers. It addresses the operational and security challenges of managing multiple Kubernetes clusters, while providing DevOps teams with integrated tools for running containerized workloads.
opsmtrs.com
May 17, 2025 at 1:07 AM
Congratulations to Michiel Peene on achieving his SUSE Certified Administrator in SUSE NeuVector 5 certification!

Keep up the good work, @mickeybyte.bsky.social
! 👏
January 22, 2025 at 8:40 AM
We also congratulate Michiel Peene on achieving his SUSE Certified Administrator in SUSE NeuVector 5 certification!

Keep up the good work, @mickeybyte.bsky.social! 👏
January 22, 2025 at 8:36 AM
I used neuvector, but it was for on-prem k8s.
December 11, 2024 at 6:36 PM
"What Agent to Trust with Your K8s: Falco, Tetragon or KubeArmor? - Henrik Rexed, Dynatrace"

Interesting session that tries to compare the features between a couple of popular agents. 🐝 No Neuvector?

Tetragon won the overall among the chosen tests.

#kubecon

www.youtube.com/watch?v=QKE8...
What Agent to Trust with Your K8s: Falco, Tetragon or KubeArmor? - Henrik Rexed, Dynatrace
YouTube video by CNCF [Cloud Native Computing Foundation]
www.youtube.com
November 19, 2024 at 10:00 PM