Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/neuvector/neuvector
  4. ›
  5. CVE-2025-54470

CVE-2025-54470: NeuVector telemetry sender is vulnerable to MITM and DoS

October 21, 2025 (updated October 30, 2025)

This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server at https://upgrades.neuvector-upgrade-responder.livestock.rancher.io.

In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attack.

The patched version includes the following security improvements:

  • NeuVector now verifies the telemetry server’s TLS certificate chain and hostname during the handshake process. This ensures that all telemetry communications occur over a trusted and verified channel.
  • NeuVector limits the telemetry server’s response to 256 bytes, mitigating the risk of memory exhaustion and DoS attacks.

These security enhancements are enabled by default and require no user action.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2025-54470
  • github.com/advisories/GHSA-qqj3-g7mx-5p4w
  • github.com/neuvector/neuvector
  • github.com/neuvector/neuvector/commit/06424701e69bf1eb76ff90180d78853fded93021
  • github.com/neuvector/neuvector/commit/415737cbec581a5dc5f204fac1c78b7f29ad7dc2
  • github.com/neuvector/neuvector/security/advisories/GHSA-qqj3-g7mx-5p4w
  • nvd.nist.gov/vuln/detail/CVE-2025-54470

Code Behaviors & Features

Detect and mitigate CVE-2025-54470 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.3.0 before 5.3.5, all versions starting from 5.4.0 before 5.4.7

Fixed versions

  • 5.3.5
  • 5.4.7

Solution

Upgrade to versions 5.3.5, 5.4.7 or above.

Impact 8.6 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/github.com/neuvector/neuvector/CVE-2025-54470.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 08 Nov 2025 00:20:55 +0000.