CVE-2025-12548

9.0 CRITICAL

📋 TL;DR

This vulnerability in Eclipse Che che-machine-exec allows unauthenticated attackers to execute arbitrary commands and steal secrets (SSH keys, tokens) from other users' Developer Workspace containers via an exposed JSON-RPC/websocket API on port 3333. It affects Eclipse Che deployments with the vulnerable component exposed.

💻 Affected Systems

Products:
  • Eclipse Che
  • Red Hat OpenShift Dev Spaces
Versions: Eclipse Che versions before 7.94.0, Red Hat OpenShift Dev Spaces versions before 3.15
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the che-machine-exec component which is part of default Eclipse Che installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all Developer Workspace containers, exfiltration of all secrets, and persistent backdoor installation across the Eclipse Che environment.

🟠

Likely Case

Unauthenticated attackers executing commands in containers, stealing SSH keys and authentication tokens, and potentially pivoting to other systems.

🟢

If Mitigated

Limited impact if network access to port 3333 is restricted and proper authentication controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to port 3333 but no authentication, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Eclipse Che 7.94.0+, Red Hat OpenShift Dev Spaces 3.15+

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-12548

Restart Required: Yes

Instructions:

1. Update Eclipse Che to version 7.94.0 or later. 2. Update Red Hat OpenShift Dev Spaces to version 3.15 or later. 3. Restart all affected services and containers.

🔧 Temporary Workarounds

Block Port 3333

linux

Restrict network access to the vulnerable port 3333 using firewall rules.

sudo iptables -A INPUT -p tcp --dport 3333 -j DROP
sudo firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="3333" protocol="tcp" reject'
sudo firewall-cmd --reload

Network Segmentation

all

Isolate Eclipse Che deployment from untrusted networks using network policies or segmentation.

🧯 If You Can't Patch

  • Implement strict network access controls to block all traffic to port 3333 from untrusted sources.
  • Monitor network traffic to port 3333 for suspicious activity and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check if port 3333 is listening and accessible: 'sudo netstat -tlnp | grep 3333' or 'ss -tlnp | grep 3333'. If accessible and running vulnerable Eclipse Che version, system is vulnerable.

Check Version:

For Eclipse Che: Check deployment manifests or 'kubectl describe pod <che-pod> | grep Image'. For OpenShift Dev Spaces: 'oc get devspaces' or check operator version.

Verify Fix Applied:

Verify Eclipse Che version is 7.94.0+ or Red Hat OpenShift Dev Spaces is 3.15+ using deployment configuration or 'kubectl get pods' with appropriate labels.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution in containers
  • Unexpected network connections to/from port 3333
  • Authentication failures or bypass attempts on JSON-RPC API

Network Indicators:

  • Unusual traffic to TCP port 3333 from external IPs
  • JSON-RPC requests to che-machine-exec endpoint without authentication
  • Websocket connections to port 3333 with command execution patterns

SIEM Query:

source_port=3333 OR dest_port=3333 AND (protocol="websocket" OR http_user_agent CONTAINS "JSON-RPC")

🔗 References

📤 Share & Export