KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 25 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:* cpe:2.3:a:kubevirt:kubevirt:1.6.0:*:*:*:*:kubernetes:*:* |
Mon, 10 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kubevirt
Kubevirt kubevirt |
|
| Vendors & Products |
Kubevirt
Kubevirt kubevirt |
Fri, 07 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1. | |
| Title | KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing | |
| Weaknesses | CWE-287 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-07T22:54:04.772Z
Updated: 2025-11-10T19:03:26.345Z
Reserved: 2025-11-03T22:12:51.365Z
Link: CVE-2025-64434
Updated: 2025-11-10T19:03:17.018Z
Status : Analyzed
Published: 2025-11-07T23:15:45.690
Modified: 2025-11-25T17:05:28.493
Link: CVE-2025-64434