We found results for “”
CVE-2025-54470
Good to know:
Date: October 23, 2025
Impact This vulnerability affects NeuVector deployments only when the "Report anonymous cluster data option" is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server at "https://upgrades.neuvector-upgrade-responder.livestock.rancher.io". In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack. The patched version includes the following security improvements: - NeuVector now verifies the telemetry server’s "TLS certificate chain" and "hostname" during the handshake process. This ensures that all telemetry communications occur over a trusted and verified channel. - NeuVector limits the telemetry server’s response to "256 bytes", mitigating the risk of memory exhaustion and DoS attacks. These security enhancements are enabled by default and require no user action. Patches Patched versions include release v5.4.7 and above. Workarounds If you cannot update to a patched version, you can temporarily disable the Report anonymous cluster data, which is enabled by default in NeuVector. To change this setting, go to Settings → Configuration → Report anonymous cluster data in the NeuVector UI. Disabling this option prevents NeuVector from sending telemetry data to the telemetry server, which helps mitigate this vulnerability. References If you have any questions or comments about this advisory: - Reach out to the "SUSE Rancher Security team" (https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the "NeuVector" (https://github.com/neuvector/neuvector/issues/new/choose) repository. - Verify with our "support matrix" (https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/) and "product support lifecycle" (https://www.suse.com/lifecycle/#suse-security).
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version https://github.com/neuvector/neuvector - v5.3.5;https://github.com/neuvector/neuvector - v5.4.7;https://github.com/neuvector/neuvector.git - v5.3.5-rc1;https://github.com/neuvector/neuvector.git - v5.4.7-rc2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


