A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 17 Sep 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs. | |
Title | NeuVector admin account has insecure default password | |
Weaknesses | CWE-1393 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: suse
Published: 2025-09-17T12:33:37.904Z
Updated: 2025-09-17T13:08:33.421Z
Reserved: 2025-07-23T08:11:06.216Z
Link: CVE-2025-8077

Updated: 2025-09-17T13:08:28.448Z

Status : Awaiting Analysis
Published: 2025-09-17T13:15:34.460
Modified: 2025-09-17T14:18:55.093
Link: CVE-2025-8077

No data.