CVE-2025-66001

8.8 HIGH

📋 TL;DR

This vulnerability in NeuVector's OpenID Connect implementation allows man-in-the-middle attacks by not enforcing TLS certificate verification by default. Attackers can intercept authentication traffic to potentially steal credentials or impersonate users. All NeuVector deployments using OpenID Connect authentication are affected.

💻 Affected Systems

Products:
  • NeuVector
Versions: All versions prior to 5.4.2
Operating Systems: All platforms running NeuVector
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using OpenID Connect authentication. Local authentication and other auth methods are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept authentication traffic, steal administrator credentials, gain full control of NeuVector cluster, and potentially pivot to underlying Kubernetes infrastructure.

🟠

Likely Case

Credential theft leading to unauthorized access to NeuVector management interface, allowing attackers to modify security policies, disable protections, or exfiltrate sensitive container security data.

🟢

If Mitigated

With TLS verification enabled, authentication remains secure, but configuration errors could still expose the system if verification is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network position to intercept TLS traffic between NeuVector and OpenID Connect provider. Standard MITM techniques apply.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.2 and later

Vendor Advisory: https://github.com/neuvector/neuvector/security/advisories/GHSA-4jj9-cgqc-x9h5

Restart Required: Yes

Instructions:

1. Upgrade NeuVector to version 5.4.2 or later. 2. Verify TLS verification is enabled in OpenID Connect configuration. 3. Restart NeuVector services.

🔧 Temporary Workarounds

Enable TLS Verification

all

Manually enable TLS certificate verification in OpenID Connect configuration

Edit NeuVector configuration to set 'verify_cert' to true in OpenID Connect settings

Network Segmentation

all

Isolate NeuVector management traffic from potential MITM attack vectors

Configure network policies to restrict traffic between NeuVector and OpenID Connect provider to trusted paths only

🧯 If You Can't Patch

  • Enable TLS certificate verification in OpenID Connect configuration immediately
  • Implement network monitoring for suspicious authentication traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check NeuVector version (must be <5.4.2) and verify OpenID Connect configuration has 'verify_cert' set to false or unspecified

Check Version:

kubectl get pods -n neuvector -l app=neuvector-controller -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o ':[0-9.]*'

Verify Fix Applied:

Confirm version is 5.4.2+ and OpenID Connect configuration shows 'verify_cert: true'

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with certificate validation errors
  • Unexpected OpenID Connect provider changes

Network Indicators:

  • Unencrypted or improperly encrypted authentication traffic to/from OpenID Connect endpoints
  • Suspicious MITM activity in network segments containing NeuVector

SIEM Query:

source="neuvector" AND ("certificate" OR "TLS" OR "OpenID") AND ("fail" OR "error" OR "invalid")

🔗 References

📤 Share & Export