Skip to content

Commit 9354480

Browse files
kakabishtsunilarjun
andcommitted
Update docs/16.security_advisories/01.security_advisories/cve.md
Co-authored-by: Sunil Singh <[email protected]>
1 parent a57ebdd commit 9354480

File tree

1 file changed

+1
-1
lines changed
  • docs/16.security_advisories/01.security_advisories

1 file changed

+1
-1
lines changed

docs/16.security_advisories/01.security_advisories/cve.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ NeuVector is committed to informing the community of security issues. Below is a
44

55
## CVE List
66

7-
| ID | Description | Date | Release |
7+
| ID | Description | Date | Resolution |
88
| :---- | :---- | :---- | :---- |
99
| [CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56) | For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
1010
| [CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3) | NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |

0 commit comments

Comments
 (0)