This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.
In affected versions, NeuVector does not enforce TLS
certificate verification when transmitting anonymous cluster data to the
telemetry server. As a result, the communication channel is susceptible
to man-in-the-middle (MITM) attacks, where an attacker could intercept
or modify the transmitted data. Additionally, NeuVector loads the
response of the telemetry server is loaded into memory without size
limitation, which makes it vulnerable to a Denial of Service(DoS)
attack
References
Configurations
No configuration.
History
30 Oct 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 10:15
Updated : 2025-10-30 15:03
NVD link : CVE-2025-54470
Mitre link : CVE-2025-54470
CVE.ORG link : CVE-2025-54470
JSON object : View
Products Affected
No product.
CWE
CWE-295
Improper Certificate Validation
