Security Advisories and CVEs
NeuVector is committed to informing the community about security issues. The following table lists published security advisories and CVEs (Common Vulnerabilities and Exposures) for resolved issues.
CVE List
| ID | Description | Date | Resolution |
|---|---|---|---|
For NeuVector deployments on Kubernetes-based environments, the bootstrap password of the default admin user is now generated randomly and stored in a Kubernetes secret. The default admin must retrieve the bootstrap password from the secret and change it after the first successful UI login. |
25 Aug 2025 |
||
NeuVector now uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. During rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash after each user’s next successful login. |
25 Aug 2025 |
||
NeuVector now redacts process commands containing |
25 Aug 2025 |
||
Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For details, see Sensitive Information Exposure in NeuVector Manager Container Logs. |
09 Jul 2025 |
||
In .NET, a malicious X.509 certificate or chain can cause excessive CPU use, leading to denial of service. This CVE was flagged as an affected .NET library detection issue. |
9 Jul 2024 |
||
The NGINX |
14 Aug 2024 |
||
In the GNU C Library through 2.29, |
15 Jan 2025 |
Not applicable. Flagged in v5.4.2 as a false positive. |
|
A security vulnerability in some Docker Engine versions may allow an attacker to bypass authorization plugins (AuthZ). The likelihood of exploitation is low. |
16 Nov 2024 |
||
|
16 Nov 2024 |
Sensitive Information Exposure in NeuVector Manager Container Logs
CVEs: CVE-2025-46808
CVSS Score: 6.8 — CVSS v3.1 Vector
CWE: CWE-532: Insertion of Sensitive Information into Log File
Impact
A vulnerability in NeuVector versions up to and including 5.4.4 could leak sensitive information in the manager container logs. The following fields may appear in logs:
| Field | Field Description | Where It Appears | Reproduction | Environment |
|---|---|---|---|---|
|
Rancher session token for single sign-on |
Request header |
Log in via Rancher UI and access NeuVector SSO |
Rancher with NeuVector SSO |
|
GitHub or Azure DevOps token |
Request body |
Submit remote repository config under Configuration > Settings |
NeuVector |
|
NeuVector user session token |
Response body |
Send GET request through NeuVector API: |
NeuVector |
|
Rekor public key, Root certificate, Signed certificate timestamp (SCT) public key in private root of trust |
Request body |
Create or update private root of trust from Sigstore page |
NeuVector |
|
Verifier’s public key |
Request body |
Create or update verifier in Sigstore page |
NeuVector |
|
NeuVector installations with single sign-on integration with Rancher Manager and Remote Repository Configuration disabled are not affected. |
In the patched version, X-R-Sess is partially masked. Other sensitive fields (personal_access_token, token, rekor_public_key, root_cert, sct_public_key, public_key) are removed from logs.
|
For more information, see Unsecured credentials (MITRE ATT&CK T1552).
Questions and Support
-
Contact the SUSE Rancher Security team.
-
Open an issue in the NeuVector GitHub repository.
-
References: