CVE-2025-54470

Source
https://cve.org/CVERecord?id=CVE-2025-54470
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54470.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54470
Aliases
Downstream
Related
Published
2025-10-30T10:15:35.257Z
Modified
2026-04-10T05:29:35.959438Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
[none]
Details

This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.

In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54470.json"