SB2025110751 - Multiple vulnerabilities in kubevirt



SB2025110751 - Multiple vulnerabilities in kubevirt

Published: November 7, 2025

Security Bulletin ID SB2025110751
Severity
High
Patch available
NO
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 14% Medium 43% Low 43%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Incorrect permission assignment for critical resource (CVE-ID: CVE-2025-64324)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a logic bug in the code of the virt-handler component. A remote attacker can read and write arbitrary files on the system.


2) Link following (CVE-ID: CVE-2025-64437)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to an insecure link following issue when determining the root mount of a virt-launcher pod. A local administrator can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.


3) Improper privilege management (CVE-ID: CVE-2025-64436)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to excessive role permissions. A remote attacker can mark all nodes as unschedulable, potentially forcing the migration or creation of privileged pods onto a compromised node.


4) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2025-64435)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper conditions check in the virt-controller. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.


5) Improper Authentication (CVE-ID: CVE-2025-64434)

The vulnerability allows a local user to bypass authentication process.

The vulnerability exists due to improper TLS certificate management within virt-handler. A local user can execute privileged operations against other virt-handler instances.


6) Information disclosure (CVE-ID: CVE-2025-64433)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to erroneous handling of symlinks defined within a PVC disk. A remote user can read any file present in the virt-launcher pod.


7) Improper Authentication (CVE-ID: CVE-2025-64432)

The vulnerability allows a local user to bypass authentication process.

The vulnerability exists due to an error when processing authentication requests in the Kubernetes aggregation layer. A local user can bypass the RBAC controls on the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.