icon

We found results for “

CVE-2025-64432

Good to know:

icon
icon

Date: November 7, 2025

KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Authentication

CWE-287

Improper Certificate Validation

CWE-295

Top Fix

icon

Upgrade Version

Upgrade to version kubevirt.io/kubevirt - v1.5.3;kubevirt.io/kubevirt - v1.6.0-beta.0.0.20250730135146-231dc69723f3;kubevirt.io/kubevirt - v1.6.1;kubevirt.io/kubevirt - v1.7.0-rc.0;https://github.com/kubevirt/kubevirt.git - v1.5.3;https://github.com/kubevirt/kubevirt.git - v1.6.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us