CVE-2025-8077

9.8 CRITICAL

📋 TL;DR

NeuVector container security platform versions up to 5.4.5 use a hardcoded default password for the built-in admin account. If not changed after deployment, any workload within the cluster can use these credentials to obtain authentication tokens and perform any operation via NeuVector APIs. This affects all NeuVector deployments with default configurations.

💻 Affected Systems

Products:
  • NeuVector Container Security Platform
Versions: All versions up to and including 5.4.5
Operating Systems: All platforms running NeuVector
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable if the default admin password was not changed after deployment. NeuVector documentation recommends changing default credentials immediately.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of NeuVector security controls, allowing attackers to disable security policies, exfiltrate sensitive container data, manipulate network rules, and potentially pivot to other cluster resources.

🟠

Likely Case

Attackers with internal cluster access use default credentials to gain administrative control over NeuVector, disabling security monitoring and modifying policies to bypass container security controls.

🟢

If Mitigated

No impact if the default password was changed during initial deployment as recommended by NeuVector documentation.

🌐 Internet-Facing: LOW - NeuVector is typically deployed internally within Kubernetes clusters and not directly internet-facing.
🏢 Internal Only: HIGH - Any compromised workload or attacker with internal cluster access can exploit this vulnerability to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access within the cluster and knowledge of the default credentials. The vulnerability is simple to exploit once an attacker gains access to any workload in the cluster.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NeuVector 5.4.6 and later

Vendor Advisory: https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56

Restart Required: Yes

Instructions:

1. Upgrade NeuVector to version 5.4.6 or later. 2. Ensure all NeuVector components (controller, enforcer, scanner) are restarted. 3. Verify the admin password has been changed from default.

🔧 Temporary Workarounds

Change Admin Password Immediately

all

Change the default admin password to a strong, unique password even if you cannot immediately patch.

kubectl exec -n neuvector deployment/neuvector-controller-pod -- nvctl user admin --set-password 'NEW_STRONG_PASSWORD'

Restrict Network Access

all

Implement network policies to restrict access to NeuVector API endpoints only to authorized management systems.

🧯 If You Can't Patch

  • Immediately change the default admin password using NeuVector's password change functionality
  • Implement strict network segmentation and Kubernetes Network Policies to limit which pods can communicate with NeuVector API endpoints

🔍 How to Verify

Check if Vulnerable:

Check if NeuVector version is 5.4.5 or earlier and verify if default admin password was changed by attempting authentication with known default credentials (not recommended in production).

Check Version:

kubectl get pods -n neuvector -o jsonpath="{.items[*].spec.containers[*].image}" | grep -o 'neuvector:[0-9.]*'

Verify Fix Applied:

Verify NeuVector version is 5.4.6 or later using 'kubectl get pods -n neuvector -o jsonpath="{.items[*].spec.containers[*].image}"' and confirm the admin password has been changed from default.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful authentication from unexpected sources
  • Administrative API calls from non-management IP addresses or service accounts

SIEM Query:

source="neuvector" AND (event="authentication" AND result="success" AND user="admin") AND NOT source_ip IN [management_ips]

🔗 References

📤 Share & Export