CVE-2025-64432

KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:1.6.0:-:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:1.6.0:rc0:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:1.6.0:rc1:*:*:*:kubernetes:*:*

History

25 Nov 2025, 15:56

Type Values Removed Values Added
First Time Kubevirt kubevirt
Kubevirt
CPE cpe:2.3:a:kubevirt:kubevirt:1.6.0:rc1:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:1.6.0:-:*:*:*:kubernetes:*:*
cpe:2.3:a:kubevirt:kubevirt:1.6.0:rc0:*:*:*:kubernetes:*:*
References () https://github.com/kubevirt/kubevirt/commit/231dc69723f331dc02f65a31ab4c3d6869f40d6a - () https://github.com/kubevirt/kubevirt/commit/231dc69723f331dc02f65a31ab4c3d6869f40d6a - Patch
References () https://github.com/kubevirt/kubevirt/commit/af2f08a9a186eccc650f87c30ab3e07b669e8b5b - () https://github.com/kubevirt/kubevirt/commit/af2f08a9a186eccc650f87c30ab3e07b669e8b5b - Patch
References () https://github.com/kubevirt/kubevirt/commit/b9773bc588e6e18ece896a2dad5336ef7a653074 - () https://github.com/kubevirt/kubevirt/commit/b9773bc588e6e18ece896a2dad5336ef7a653074 - Patch
References () https://github.com/kubevirt/kubevirt/security/advisories/GHSA-38jw-g2qx-4286 - () https://github.com/kubevirt/kubevirt/security/advisories/GHSA-38jw-g2qx-4286 - Exploit, Vendor Advisory
Summary
  • (es) KubeVirt es un complemento de gestión de máquinas virtuales para Kubernetes. Las versiones 1.5.3 e inferiores, y 1.6.0 contenían una implementación defectuosa del flujo de autenticación de la capa de agregación de Kubernetes que podría permitir la elusión de los controles RBAC. Se descubrió que el componente virt-API no logra autenticar correctamente al cliente al recibir solicitudes de API a través de mTLS. En particular, no logra validar el campo CN (Common Name) en los certificados TLS del cliente recibidos contra el conjunto de valores permitidos definidos en el configmap 'extension-apiserver-authentication'. La falta de validación de ciertos campos en el certificado TLS del cliente puede permitir a un atacante eludir los controles RBAC existentes al comunicarse directamente con el servidor API agregado, suplantando al servidor API de Kubernetes y su componente agregador. Este problema está corregido en las versiones 1.5.3 y 1.6.1.

07 Nov 2025, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-07 19:16

Updated : 2025-11-25 15:56


NVD link : CVE-2025-64432

Mitre link : CVE-2025-64432

CVE.ORG link : CVE-2025-64432


JSON object : View

Products Affected

kubevirt

  • kubevirt
CWE
CWE-287

Improper Authentication

CWE-295

Improper Certificate Validation