icon

We found results for “

CVE-2025-54470

Good to know:

icon

Date: October 30, 2025

This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server. In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack

Severity Score

Severity Score

Weakness Type (CWE)

Improper Certificate Validation

CWE-295

Allocation of Resources Without Limits or Throttling

CWE-770

Top Fix

icon

Upgrade Version

Upgrade to version github.com/neuvector/neuvector - v5.3.5;github.com/neuvector/neuvector - v5.4.7;github.com/neuvector/neuvector - v0.0.0-20251020133207-084a437033b4;https://github.com/neuvector/neuvector.git - v5.3.5-rc1;https://github.com/neuvector/neuvector.git - v5.4.7-rc2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): HIGH

Do you need more information?

Contact Us