icon

We found results for “

CVE-2025-67860

Good to know:

icon
icon

Date: February 13, 2026

Impact A vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credentials to local users. This may allow unauthorized access to registries or the NeuVector controller, potentially enabling image manipulation, information disclosure, or further lateral movement within the environment. Important: - For the exposure of credentials not related to Rancher NeuVector, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services. - It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary. Please consult the associated "MITRE ATT&CK – Technique – Credential Access and Unsecured Credentials" (https://attack.mitre.org/techniques/T1552/) for further information about this category of attack. Patches Patched versions include release "v4.072" and above. Starting from version "v4.072", the scanner monitor process does not pass credentials to the scanner anymore. Instead, scanner process gets credentials information from environment variables, preventing them from being exposed through "/proc/*/cmdline". Workarounds There is no workaround for this issue. Users are recommended to upgrade, as soon as possible, to a version of NeuVector scanner that contains the fix. References If you have any questions or comments about this advisory: - Reach out to the "SUSE Rancher Security team" (https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the "NeuVector" (https://github.com/neuvector/neuvector/issues/new/choose) repository. - Verify with our "support matrix" (https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/) and "product support lifecycle" (https://www.suse.com/lifecycle/#suse-security).

Severity Score

Severity Score

Weakness Type (CWE)

Insufficiently Protected Credentials

CWE-522

Top Fix

icon

Upgrade Version

Upgrade to version github.com/neuvector/scanner - v4.072;https://github.com/neuvector/scanner.git - v4.072

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us