CVE-2025-62877

9.8 CRITICAL

📋 TL;DR

CVE-2025-62877 exposes the default SSH login password in SUSE Harvester virtualization environments when using the interactive installer (1.5.x or 1.6.x) to create new clusters or add hosts. This allows attackers to gain unauthorized access to affected systems. Only environments using the interactive installer are affected - PXE boot installations remain secure.

💻 Affected Systems

Products:
  • SUSE Harvester (Virtualization Platform)
Versions: 1.5.x and 1.6.x
Operating Systems: Linux-based Harvester OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using the interactive installer. PXE boot installations with Harvester configuration setup are NOT affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the Harvester cluster, allowing attackers to access all virtual machines, steal sensitive data, deploy ransomware, or use the infrastructure for further attacks.

🟠

Likely Case

Unauthorized SSH access to Harvester nodes, enabling privilege escalation, configuration manipulation, and lateral movement within the virtualization environment.

🟢

If Mitigated

Limited impact if strong network segmentation, firewall rules, and monitoring are in place to detect and block unauthorized SSH attempts.

🌐 Internet-Facing: HIGH if Harvester management interfaces are exposed to the internet, as default credentials can be easily brute-forced.
🏢 Internal Only: MEDIUM to HIGH depending on internal network security posture, as attackers with internal access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the default SSH password, which is exposed through the vulnerability. No authentication bypass needed once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Harvester 1.6.2 or later versions

Vendor Advisory: https://github.com/harvester/harvester/security/advisories/GHSA-6g8q-hp2j-gvwv

Restart Required: Yes

Instructions:

1. Backup your Harvester configuration and data. 2. Update Harvester to version 1.6.2 or later using the official update mechanism. 3. Restart all Harvester services and nodes. 4. Change all SSH passwords on affected systems.

🔧 Temporary Workarounds

Change Default SSH Passwords

linux

Immediately change all default SSH passwords on Harvester nodes to strong, unique passwords.

passwd
ssh-keygen -t rsa -b 4096

Restrict SSH Access

linux

Configure firewall rules to restrict SSH access to trusted IP addresses only.

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Immediately change all default SSH passwords and implement strong password policies
  • Implement network segmentation and firewall rules to restrict SSH access to management networks only

🔍 How to Verify

Check if Vulnerable:

Check if using Harvester 1.5.x or 1.6.x with interactive installer. Review installation logs for interactive installer usage.

Check Version:

harvester version

Verify Fix Applied:

Verify Harvester version is 1.6.2 or later using 'harvester version' command. Confirm SSH passwords have been changed from defaults.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH login attempts with default credentials
  • Successful SSH logins from unexpected sources
  • Interactive installer usage in installation logs

Network Indicators:

  • SSH connections to Harvester nodes from unauthorized IPs
  • Brute-force attempts on SSH port 22

SIEM Query:

source="auth.log" AND ("Failed password" OR "Accepted password") AND ("root" OR default_user) AND destination_ip="HARVESTER_NODE_IP"

🔗 References

📤 Share & Export