CVE-2025-67860

3.8 LOW

📋 TL;DR

NeuVector scanner exposes sensitive credentials via command-line arguments, allowing local users on the same system to view registry and controller credentials. This affects NeuVector deployments where the scanner process runs with command-line arguments containing credentials.

💻 Affected Systems

Products:
  • NeuVector
  • Harvester (when using NeuVector)
Versions: All versions prior to fixes
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when scanner runs with credentials passed as command-line arguments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers gain access to container registry and controller credentials, potentially compromising container images and NeuVector management infrastructure.

🟠

Likely Case

Malicious local users or compromised processes harvest credentials from process listings, leading to unauthorized access to container registries.

🟢

If Mitigated

Limited to credential exposure on already-compromised systems with local access.

🌐 Internet-Facing: LOW - Requires local system access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with local access to scanner hosts can harvest credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to view process command-line arguments via tools like ps or /proc filesystem.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisories for specific fixed versions

Vendor Advisory: https://github.com/harvester/harvester/security/advisories/GHSA-3c9m-gq32-g4jx

Restart Required: Yes

Instructions:

1. Update NeuVector to patched version. 2. Update Harvester if using integrated NeuVector. 3. Restart scanner processes.

🔧 Temporary Workarounds

Restrict process visibility

linux

Limit access to process information via kernel parameters

sysctl kernel.yama.ptrace_scope=2
mount -o remount,hidepid=2 /proc

Use environment variables

linux

Configure scanner to read credentials from environment variables instead of command-line

export NV_REGISTRY_CREDS=...
export NV_CONTROLLER_CREDS=...

🧯 If You Can't Patch

  • Restrict local user access to scanner hosts
  • Monitor process listings for credential exposure

🔍 How to Verify

Check if Vulnerable:

Check if scanner process shows credentials in command-line: ps aux | grep neuvector-scanner

Check Version:

docker inspect neuvector/scanner:latest | grep -i version

Verify Fix Applied:

Verify updated version and check that credentials no longer appear in process listings

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts using scanner credentials
  • Unexpected registry access

Network Indicators:

  • Unusual registry pull patterns from scanner hosts

SIEM Query:

process.command_line CONTAINS 'password' OR process.command_line CONTAINS 'cred' AND process.name='neuvector-scanner'

🔗 References

📤 Share & Export