Security Advisories and CVEs
NeuVector is committed to informing the community of security issues. Below is a CVE reference list of published security advisories and CVEs (Common Vulnerabilities and Exposures) for issues we have resolved.
CVE List
ID | Description | Date | Resolution |
---|---|---|---|
For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change their password after the first UI login is successful. |
25 Aug 2025 |
||
NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. |
25 Aug 2025 |
||
By default, NeuVector redacts process commands that contain the strings |
25 Aug 2025 |
||
Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For more information, refer to Sensitive information exposure in NeuVector manager container logs. |
09 Jul 2025 |
||
In .NET, a malicious X.509 certificate or certificate chain can cause excessive CPU consumption, resulting in denial of service. This CVE was flagged as an affected .NET library detection issue. |
09 Jul 2025 |
||
The NGINX |
15 Jan 2025 |
||
In the GNU C Library through 2.29, check_dst_limits_calc_pos_1 in |
15 Jan 2025 |
Not applicable, flagged in v5.4.2 as a false positive. |
|
A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. |
16 Nov 2024 |
||
|
16 Nov 2024 |
Sensitive information exposure in NeuVector manager container logs
CVE ID: CVE-2025-46808 CVSS Score: 6.8- AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CWE: CWE-532: Insertion of Sensitive Information into Log File
Affected Versions
-
All versions earlier than
5.0.0
-
Versions from
5.0.0
up to and including5.4.4
Fixed version: 5.4.5
Impact
A vulnerability has been identified in the NeuVector version up to and including 5.4.4
, where sensitive information is leaked into the manager container’s log. The listed fields can be caught in the log:
Field | Field Description | Where it Appears | Reproduction | Environment |
---|---|---|---|---|
|
Rancher’s session token for single sign on token |
Request header |
Log in via Rancher UI and access NeuVector SSO |
Rancher with NeuVector SSO |
|
The Github / Azure DevOps token |
Request body |
Submit remote repository config under Configuration > Settings |
NeuVector |
|
NeuVector user’s session token |
Response body |
Send GET request through NeuVector web server’s API: |
NeuVector |
|
Rekor public key, Root certificate, Signed certificate timestamp(SCT) Public Key in private root of trust |
Request body |
Create/update private root of trust from Sigstore page |
NeuVector |
public_key |
Verifier’s public key |
Request body |
Create/update verifier in Sigstore page |
NeuVector |
NeuVector installations that have the single sign-on integration with Rancher Manager and the Remote Repository Configuration disabled are not affected by this issue. |
In the patched version, X-R-Sess is partially masked so that users can confirm what is being used while still keeping it safe for consumption. The log, which includes personal_access_token
, token
, rekor_public_key
, root_cert
, sct_public_key
, and public key
are removed, as the request body is not mandatory in the log.
|
Please consult the associated Unsecured credentials for further information about this category of attack.
Questions and Support
-
Contact the SUSE Rancher Security team
-
Open an issue in the NeuVector GitHub repository
-
References: