We found results for “”
CVE-2025-54470
Good to know:
Date: October 30, 2025
This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server. In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version github.com/neuvector/neuvector - v5.3.5;github.com/neuvector/neuvector - v5.4.7;github.com/neuvector/neuvector - v0.0.0-20251020133207-084a437033b4;https://github.com/neuvector/neuvector.git - v5.3.5-rc1;https://github.com/neuvector/neuvector.git - v5.4.7-rc2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


