FKIE_CVE-2025-7342
Vulnerability from fkie_nvd - Published: 2025-08-17 23:15 - Updated: 2025-11-04 22:16
Severity ?
Summary
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de seguridad en Kubernetes Image Builder, donde las credenciales predeterminadas se habilitan durante el proceso de creaci\u00f3n de la imagen. Adem\u00e1s, las im\u00e1genes de m\u00e1quinas virtuales creadas con Nutanix u OVA no deshabilitan estas credenciales predeterminadas, y los nodos que utilizan las im\u00e1genes resultantes pueden ser accesibles mediante estas credenciales. Estas credenciales se pueden usar para obtener acceso root. Los cl\u00fasteres de Kubernetes solo se ven afectados si sus nodos de Windows usan im\u00e1genes de m\u00e1quinas virtuales creadas mediante el proyecto Generador de Im\u00e1genes con su proveedor Nutanix u OVA."
}
],
"id": "CVE-2025-7342",
"lastModified": "2025-11-04T22:16:43.553",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "jordan@liggitt.net",
"type": "Secondary"
}
]
},
"published": "2025-08-17T23:15:26.860",
"references": [
{
"source": "jordan@liggitt.net",
"url": "https://github.com/kubernetes/kubernetes/issues/133115"
},
{
"source": "jordan@liggitt.net",
"url": "https://groups.google.com/g/kubernetes-security-announce/c/tuEsLUQu_PA"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/07/22/1"
}
],
"sourceIdentifier": "jordan@liggitt.net",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "jordan@liggitt.net",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…