SB2025110751 - Multiple vulnerabilities in kubevirt
Published: November 7, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Incorrect permission assignment for critical resource (CVE-ID: CVE-2025-64324)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a logic bug in the code of the virt-handler component. A remote attacker can read and write arbitrary files on the system.
2) Link following (CVE-ID: CVE-2025-64437)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to an insecure link following issue when determining the root mount of a virt-launcher pod. A local administrator can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
3) Improper privilege management (CVE-ID: CVE-2025-64436)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to excessive role permissions. A remote attacker can mark all nodes as unschedulable, potentially forcing the migration or creation of privileged pods onto a compromised node.
4) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2025-64435)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper conditions check in the virt-controller. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.
5) Improper Authentication (CVE-ID: CVE-2025-64434)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to improper TLS certificate management within virt-handler. A local user can execute privileged operations against other virt-handler instances.
6) Information disclosure (CVE-ID: CVE-2025-64433)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to erroneous handling of symlinks defined within a PVC disk. A remote user can read any file present in the virt-launcher pod.
7) Improper Authentication (CVE-ID: CVE-2025-64432)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error when processing authentication requests in the Kubernetes aggregation layer. A local user can bypass the RBAC controls on the system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-46xp-26xh-hpqh
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-2r4r-5x78-mvqf
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-7xgm-5prm-v5gc
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-9m94-w2vq-hcf9
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-ggp9-c99x-54gp
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-qw6q-3pgr-5cwq
- https://github.com/kubevirt/kubevirt/security/advisories/GHSA-38jw-g2qx-4286