You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/16.security_advisories/01.security_advisories/cve.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,12 +4,12 @@ NeuVector is committed to informing the community of security issues. Below is a
4
4
5
5
## CVE List
6
6
7
-
| ID | Description | Date |Resolution|
7
+
| ID | Description | Date |Release|
8
8
| :---- | :---- | :---- | :---- |
9
9
|[CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)| For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
10
10
|[CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)| NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
11
11
|[CVE-2025-54467](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq)| By default, NeuVector redacts process commands that contain the strings password,passwd, pwd, token, or key in security logs, syslog, enforcer debug logs, controller debug logs, webhooks, and support logs. Users can configure a Kubernetes ConfigMap to define custom regex patterns for additional process commands to redact. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
12
-
|[CVE-2025-46808](?)| Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For more information, refer to [ Sensitive information exposure in NeuVector manager container logs](#sensitive-information-exposure-in-neuvector-manager-container-logs)|?|[NeuVector v5.4.5](https://github.com/neuvector/neuvector/releases/tag/v5.4.5)|
12
+
|CVE-2025-46808 | Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For more information, refer to [ Sensitive information exposure in NeuVector manager container logs](#sensitive-information-exposure-in-neuvector-manager-container-logs)|09 Jul 2025|[NeuVector v5.4.5](https://github.com/neuvector/neuvector/releases/tag/v5.4.5)|
13
13
14
14
15
15
| — | . Fixed in 5.4.5. | < 5.0.0 – 5.4.4
@@ -40,16 +40,17 @@ A vulnerability has been identified in the NeuVector version up to and including
40
40
| public\_key | Verifier’s public key | Request body | Create/update verifier in Sigstore page | NeuVector |
41
41
42
42
:::note
43
-
**Note:**NeuVector installations not using the single sign-on integration with Rancher Manager, and does not have Remote Repository Configuration enabled, are not affected by this issue.
43
+
NeuVector installations that have the single sign-on integration with Rancher Manager and the Remote Repository Configuration disabled are not affected by this issue.
44
44
:::
45
45
46
-
In the patched version, X-R-Sess is partially masked so that users can confirm what it is being used while still keeping it safe for consumption. The log which includes `personal_access_token`, `token`, `rekor_public_key`, `root_cert`, `sct_public_key`, `public key` are removed, as the request body is not mandatory in the log.
46
+
In the patched version, X-R-Sess is partially masked so that users can confirm what is being used while still keeping it safe for consumption. The log, which includes `personal_access_token`, `token`, `rekor_public_key`, `root_cert`, `sct_public_key`, and`public key` are removed, as the request body is not mandatory in the log.
47
47
48
48
:::note
49
49
* The severity of the vulnerability depends on your logging strategy.
50
50
***Local logging (default)**: Limits exposure of impact.
51
51
***External logging**: Vulnerability’s severity increases, the impact depends on security measures implemented at the external log collector level.
52
52
* The final impact severity for confidentiality, integrity and availability is dependent on the permissions that the leaked credentials have on their own services.
53
+
:::
53
54
54
55
Please consult the associated [Unsecured credentials](https://attack.mitre.org/techniques/T1552/) for further information about this category of attack.
55
56
@@ -66,5 +67,5 @@ No workarounds are currently available. Customers are advised to upgrade to a fi
66
67
* Contact the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy).
67
68
* Open an issue in the [NeuVector GitHub repository](https://github.com/neuvector/neuvector/issues/new/choose).
68
69
* References:
69
-
**[NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
70
-
**[Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)
70
+
*[NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
71
+
*[Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)
Copy file name to clipboardExpand all lines: versioned_docs/version-5.4/16.security_advisories/01.security_advisories/cve.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,12 @@ NeuVector is committed to informing the community of security issues. Below is a
7
7
| ID | Description | Date | Release |
8
8
| :---- | :---- | :---- | :---- |
9
9
|[CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)| For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
10
-
|[CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)| NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
10
+
|[CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)| NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
11
11
|[CVE-2025-54467](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq)| By default, NeuVector redacts process commands that contain the strings password,passwd, pwd, token, or key in security logs, syslog, enforcer debug logs, controller debug logs, webhooks, and support logs. Users can configure a Kubernetes ConfigMap to define custom regex patterns for additional process commands to redact. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
12
+
|CVE-2025-46808 | Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For more information, refer to [ Sensitive information exposure in NeuVector manager container logs](#sensitive-information-exposure-in-neuvector-manager-container-logs)| 09 Jul 2025 |[NeuVector v5.4.5](https://github.com/neuvector/neuvector/releases/tag/v5.4.5)|
13
+
14
+
15
+
| — | . Fixed in 5.4.5. | < 5.0.0 – 5.4.4
12
16
13
17
## Sensitive information exposure in NeuVector manager container logs
14
18
@@ -36,16 +40,17 @@ A vulnerability has been identified in the NeuVector version up to and including
36
40
| public\_key | Verifier’s public key | Request body | Create/update verifier in Sigstore page | NeuVector |
37
41
38
42
:::note
39
-
**Note:**NeuVector installations not using the single sign-on integration with Rancher Manager, and does not have Remote Repository Configuration enabled, are not affected by this issue.
43
+
NeuVector installations that have the single sign-on integration with Rancher Manager and the Remote Repository Configuration disabled are not affected by this issue.
40
44
:::
41
45
42
-
In the patched version, X-R-Sess is partially masked so that users can confirm what it is being used while still keeping it safe for consumption. The log which includes `personal_access_token`, `token`, `rekor_public_key`, `root_cert`, `sct_public_key`, `public key` are removed, as the request body is not mandatory in the log.
46
+
In the patched version, X-R-Sess is partially masked so that users can confirm what is being used while still keeping it safe for consumption. The log, which includes `personal_access_token`, `token`, `rekor_public_key`, `root_cert`, `sct_public_key`, and`public key` are removed, as the request body is not mandatory in the log.
43
47
44
48
:::note
45
49
* The severity of the vulnerability depends on your logging strategy.
46
50
***Local logging (default)**: Limits exposure of impact.
47
51
***External logging**: Vulnerability’s severity increases, the impact depends on security measures implemented at the external log collector level.
48
52
* The final impact severity for confidentiality, integrity and availability is dependent on the permissions that the leaked credentials have on their own services.
53
+
:::
49
54
50
55
Please consult the associated [Unsecured credentials](https://attack.mitre.org/techniques/T1552/) for further information about this category of attack.
51
56
@@ -62,5 +67,5 @@ No workarounds are currently available. Customers are advised to upgrade to a fi
62
67
* Contact the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy).
63
68
* Open an issue in the [NeuVector GitHub repository](https://github.com/neuvector/neuvector/issues/new/choose).
64
69
* References:
65
-
**[NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
66
-
**[Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)
70
+
*[NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
71
+
*[Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)
0 commit comments