Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In Kata Containers versions from 3.20.0 and before, a malicious host can circumvent initdata verification. On TDX systems running confidential guests, a malicious host can selectively fail IO operations to skip initdata verification. This allows an attacker to launch arbitrary workloads while being able to attest successfully to Trustee impersonating any benign workload. This issue has been patched in Kata Containers version 3.21.0.
History

Wed, 01 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}

threat_severity

Moderate


Thu, 25 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers
Katacontainers kata-containers
Vendors & Products Katacontainers
Katacontainers kata-containers

Wed, 24 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Description Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In Kata Containers versions from 3.20.0 and before, a malicious host can circumvent initdata verification. On TDX systems running confidential guests, a malicious host can selectively fail IO operations to skip initdata verification. This allows an attacker to launch arbitrary workloads while being able to attest successfully to Trustee impersonating any benign workload. This issue has been patched in Kata Containers version 3.21.0.
Title Kata Containers coco-tdx malicious host can circumvent initdata verification
Weaknesses CWE-754
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-09-23T21:08:47.147Z

Updated: 2025-09-24T13:22:15.628Z

Reserved: 2025-08-29T16:19:59.010Z

Link: CVE-2025-58354

cve-icon Vulnrichment

Updated: 2025-09-24T13:21:16.555Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-23T21:15:52.213

Modified: 2025-09-24T18:11:24.520

Link: CVE-2025-58354

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-09-23T21:08:47Z

Links: CVE-2025-58354 - Bugzilla