Security Advisories and CVEs
NeuVector is committed to informing the community about security issues. The following table lists published security advisories and CVEs (Common Vulnerabilities and Exposures) for resolved issues.
CVE List
| ID | Description | Date | Resolution |
|---|---|---|---|
In the patched version, new NeuVector deployments enable TLS verification by default. For rolling upgrades, NeuVector does not change this setting automatically to avoid disruption. |
12 Dec 2025 |
||
For NeuVector deployments on Kubernetes-based environments, the bootstrap password of the default admin user is now generated randomly and stored in a Kubernetes secret. The default admin must retrieve the bootstrap password from the secret and change it after the first successful UI login. |
25 Aug 2025 |
||
NeuVector now uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. During rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash after each user’s next successful login. |
25 Aug 2025 |
||
NeuVector now redacts process commands containing |
25 Aug 2025 |
||
Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. |
09 Jul 2025 |
||
In .NET, a malicious X.509 certificate or chain can cause excessive CPU use, leading to denial of service. This CVE was flagged as an affected .NET library detection issue. |
9 Jul 2024 |
||
The NGINX |
14 Aug 2024 |
||
In the GNU C Library through 2.29, |
15 Jan 2025 |
Not applicable. Flagged in v5.4.2 as a false positive. |
|
A security vulnerability in some Docker Engine versions may allow an attacker to bypass authorization plugins (AuthZ). The likelihood of exploitation is low. |
16 Nov 2024 |
||
|
16 Nov 2024 |
OpenID Connect is vulnerable to MITM
-
CVE ID: CVE-2025-66001 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
-
CVSS Score: 8.8
Impact
NeuVector supports authentication using OpenID Connect. TLS verification, which validates the authenticity and integrity of the remote server, is not enforced by default. This can expose the system to man-in-the-middle (MITM) attacks.
Beginning with version 5.4.0, NeuVector supports TLS verification for:
-
Registry connections
-
Auth server connections (SAML, LDAP, and OIDC)
-
Webhook connections
By default, TLS verification remains disabled. The setting is available under Settings → Configuration in the NeuVector UI.
In the patched version, new NeuVector deployments enable TLS verification by default. Rolling upgrades do not modify existing configurations to prevent service disruption.
|
When TLS verification is enabled, it applies to:
|
Questions and Support
-
Contact the SUSE Rancher Security team for security-related inquiries.
-
Open an issue in the NeuVector repository.
-
Review the support matrix and product support lifecycle.
NeuVector is shipping cryptographic material into its binary
-
CVE ID: CVE-2025-54471
-
CVSS Score: 6.5 – AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Impact
NeuVector previously used a hard-coded cryptographic key embedded in the source code. During compilation, this value was replaced with a static secret key used to encrypt sensitive configuration fields.
In the patched release, NeuVector uses the Kubernetes secret neuvector-store-secret (in the neuvector namespace) to generate secure, dynamic encryption keys. This removes reliance on static keys and improves security by storing keys in Kubernetes-managed secrets.
During rolling upgrades or when restoring from persistent storage, the NeuVector controller checks encrypted configuration fields. If a field is encrypted with the default fixed key, it is decrypted and re-encrypted using the new dynamic key.
If the controller lacks RBAC permissions to access the Kubernetes secret, it logs:
Required Kubernetes RBAC for secrets are not found
and exits.
Device encryption keys rotate every 3 months. For more details, see: Rotating sensitive field in configuration.
Questions and Support
-
Contact the SUSE Rancher Security team.
-
Open an issue in the NeuVector GitHub repository.
-
References:
Telemetry sender is vulnerable to MITM and DoS
-
CVE ID: CVE-2025-54470
-
CVSS Score: 8.6 – AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Affected Versions
-
All versions earlier than
5.3.0 -
Versions
5.3.0through5.4.6
Fixed versions: 5.4.7, 5.3.5
Impact
This vulnerability affects NeuVector deployments only when Report anonymous cluster data is enabled. When active, NeuVector sends anonymous telemetry data to:
In affected versions, TLS certificate verification is not enforced, making telemetry communication vulnerable to MITM attacks. An attacker could intercept or modify the transmitted data.
NeuVector also loaded the telemetry server response into memory without size limits, exposing the system to Denial-of-Service (DoS) risks.
The patched version includes:
-
Verification of the TLS certificate chain and hostname for the telemetry server.
-
A response size limit of 256 bytes to mitigate memory exhaustion.
These improvements are enabled by default and require no user action.
Workarounds
If you cannot update, disable Report anonymous cluster data:
Settings → Configuration → Report anonymous cluster data
Disabling this setting prevents NeuVector from sending telemetry data, reducing exposure to this vulnerability.
Recommendation: Upgrade to a patched version as soon as possible.
Questions and Support
-
Contact the SUSE Rancher Security team.
-
Open an issue in the NeuVector GitHub repository.
-
References:
Sensitive Information Exposure in NeuVector Manager Container Logs
CVEs: CVE-2025-46808
CVSS Score: 6.8 — CVSS v3.1 Vector
CWE: CWE-532: Insertion of Sensitive Information into Log File
Impact
A vulnerability in NeuVector versions up to and including 5.4.4 could leak sensitive information in the manager container logs. The following fields may appear in logs:
| Field | Field Description | Where It Appears | Reproduction | Environment |
|---|---|---|---|---|
|
Rancher session token for single sign-on |
Request header |
Log in via Rancher UI and access NeuVector SSO |
Rancher with NeuVector SSO |
|
GitHub or Azure DevOps token |
Request body |
Submit remote repository config under Configuration > Settings |
NeuVector |
|
NeuVector user session token |
Response body |
Send GET request through NeuVector API: |
NeuVector |
|
Rekor public key, Root certificate, Signed certificate timestamp (SCT) public key in private root of trust |
Request body |
Create or update private root of trust from Sigstore page |
NeuVector |
|
Verifier’s public key |
Request body |
Create or update verifier in Sigstore page |
NeuVector |
|
NeuVector installations with single sign-on integration with Rancher Manager and Remote Repository Configuration disabled are not affected. |
In the patched version, X-R-Sess is partially masked. Other sensitive fields (personal_access_token, token, rekor_public_key, root_cert, sct_public_key, public_key) are removed from logs.
|
For more information, see Unsecured credentials (MITRE ATT&CK T1552).
Questions and Support
-
Contact the SUSE Rancher Security team.
-
Open an issue in the NeuVector GitHub repository.
-
References: