Github.Com Neuvector Neuvector vulnerabilities
9 known vulnerabilities affecting github.com/neuvector_neuvector.
Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH2MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2025-66001HIGH≥ 5.3.0, < 5.4.82025-12-12
CVE-2025-66001 [HIGH] CWE-295 NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)
### Impact
NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. As a result this may expose the system to man-in-the-middle (MITM) attacks.
Starting from version 5.4.0, NeuVector sup
ghsaosv
CVE-2025-54469CRITICAL≥ 5.3.0, < 5.3.5≥ 5.4.0, < 5.4.7+1 more2025-10-21
CVE-2025-54469 [CRITICAL] CWE-120 NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow
NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow
### Impact
A vulnerability was identified in NeuVector, where the enforcer used environment variables `CLUSTER_RPC_PORT` and `CLUSTER_LAN_PORT` to generate a command to be executed via `popen`, without first sanitising their values.
The entry process of the enforcer container is the monitor process. When the enforc
ghsaosv
CVE-2025-54470HIGH≥ 5.3.0, < 5.3.5≥ 5.4.0, < 5.4.7+1 more2025-10-21
CVE-2025-54470 [HIGH] CWE-295 NeuVector telemetry sender is vulnerable to MITM and DoS
NeuVector telemetry sender is vulnerable to MITM and DoS
### Impact
This vulnerability affects NeuVector deployments only when the `Report anonymous cluster data option` is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server at `https://upgrades.neuvector-upgrade-responder.livestock.rancher.io`.
In affected versions, NeuVector does not enforce TLS certificat
ghsaosv
CVE-2025-54471MEDIUM≥ 5.3.0, < 5.4.7≥ 0.0.0-20230727023453-1c4957d53911, < 0.0.0-20251020133207-084a437033b42025-10-21
CVE-2025-54471 [MEDIUM] CWE-321 NeuVector is shipping cryptographic material into its binary
NeuVector is shipping cryptographic material into its binary
### Impact
NeuVector used a hard-coded cryptographic key embedded in the source code. At compilation time, the key value was replaced with the secret key value and used to encrypt sensitive configurations when NeuVector stores the data.
In the patched version, NeuVector leverages the Kubernetes secret `neuvector-store-secret` in `neuvector` n
ghsaosv
CVE-2025-8077CRITICAL≥ 5.0.0, < 5.4.62025-08-28
CVE-2025-8077 [CRITICAL] CWE-1393 NeuVector admin account has insecure default password
NeuVector admin account has insecure default password
### Impact
A vulnerability exists in NeuVector versions up to and including **5.4.5**, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token.
ghsaosv
CVE-2025-53884MEDIUM≥ 5.0.0, < 5.4.62025-08-28
CVE-2025-53884 [MEDIUM] CWE-759 NeuVector has an insecure password storage vulnerable to rainbow attack
NeuVector has an insecure password storage vulnerable to rainbow attack
### Impact
NeuVector stores user passwords and API keys using a simple, unsalted hash. This method is vulnerable to rainbow table attack (offline attack where hashes of known passwords are precomputed).
NeuVector generates a cryptographically secure, random 16-character salt and uses it with the PBKDF2 algorithm to cre
ghsaosv
CVE-2025-54467MEDIUM≥ 5.0.0, < 5.4.62025-08-28
CVE-2025-54467 [MEDIUM] CWE-522 NeuVector process with sensitive arguments lead to leakage
NeuVector process with sensitive arguments lead to leakage
### Impact
When a Java command with password parameters is executed and terminated by NeuVector for Process rule violation. For example,
```
java -cp /app ... Djavax.net.ssl.trustStorePassword=
```
The command with the password appears in the NeuVector security event. To prevent this, NeuVector uses the following default regular expression to d
ghsaosv
CVE-2023-22644CRITICAL≥ 0, < 0.0.0-20231003121714-be746957ee7c2023-10-06
CVE-2023-22644 [CRITICAL] JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
### Impact
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
### Patches
Upgrade to NeuVector [version 5.2.2](https://open-docs.neuvect
osv
CVE-2023-32188CRITICAL≥ 0, < 0.0.0-20231003121714-be746957ee7c2023-10-06
CVE-2023-32188 [CRITICAL] CWE-1270 JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
### Impact
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
### Patches
Upgrade to NeuVector [version 5.2.2](https://open-doc
ghsa