CVE-2025-14758

6.5 MEDIUM

📋 TL;DR

This vulnerability allows an on-path attacker to read database contents, including potentially sensitive credentials, due to incorrect replication security configuration in MariaDB within the YAOOK Operator's infra-operator component. It affects systems running vulnerable versions of YAOOK Operator with the infra-operator component enabled. Attackers must be positioned on the network path between replication nodes.

💻 Affected Systems

Products:
  • YAOOK Operator
Versions: Versions prior to the fix (specific version not provided in reference)
Operating Systems: All platforms running YAOOK Operator
Default Config Vulnerable: ⚠️ Yes
Notes: Requires infra-operator component with MariaDB replication enabled. The vulnerability is in the replication security configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of database contents including credentials, leading to lateral movement, data exfiltration, and potential full system compromise.

🟠

Likely Case

Unauthorized reading of sensitive database information, potentially exposing credentials and other confidential data.

🟢

If Mitigated

Limited exposure of non-sensitive data if proper network segmentation and encryption are in place.

🌐 Internet-Facing: MEDIUM - Exploitation requires on-path position, but internet-facing replication traffic could be intercepted.
🏢 Internal Only: HIGH - Internal network traffic between database nodes is often less monitored and easier to intercept.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network positioning between replication nodes and understanding of MariaDB replication protocols. No authentication needed once positioned correctly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference, but fix is available according to GitLab issue

Vendor Advisory: https://gitlab.com/yaook/operator/-/issues/631

Restart Required: Yes

Instructions:

1. Update YAOOK Operator to the latest version. 2. Ensure infra-operator component is updated. 3. Restart affected services. 4. Verify replication security configuration is properly applied.

🔧 Temporary Workarounds

Enable TLS for MariaDB replication

all

Configure MariaDB replication to use TLS encryption to prevent on-path interception

# Configure MariaDB with SSL/TLS for replication
# Set ssl-ca, ssl-cert, ssl-key parameters in my.cnf
# Configure CHANGE MASTER TO with SSL options

Network segmentation

linux

Isolate replication traffic to a dedicated, secured network segment

# Use firewall rules to restrict replication traffic
# Example: iptables -A INPUT -p tcp --dport 3306 -s [replica_ip] -j ACCEPT

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate replication traffic from untrusted networks.
  • Enable and enforce TLS encryption for all MariaDB replication connections.

🔍 How to Verify

Check if Vulnerable:

Check if running vulnerable YAOOK Operator version with infra-operator enabled and MariaDB replication configured without proper security (TLS). Review replication configuration in MariaDB.

Check Version:

kubectl get pods -n [yaook-namespace] -o jsonpath='{.items[*].spec.containers[*].image}' | grep yaook/operator

Verify Fix Applied:

Verify YAOOK Operator is updated to patched version, check that replication connections are using TLS, and confirm no unencrypted replication traffic is detectable.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to replication ports
  • Replication errors or warnings in MariaDB logs
  • Unusual data access patterns from replication nodes

Network Indicators:

  • Unencrypted replication traffic on port 3306 between nodes
  • Unexpected sources connecting to replication ports

SIEM Query:

source="mariadb.log" AND ("replication" AND ("error" OR "warning" OR "unauthorized")) OR destination_port=3306 AND NOT protocol="TLS"

🔗 References

📤 Share & Export