CVE-2025-64434

Source
https://cve.org/CVERecord?id=CVE-2025-64434
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64434.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-64434
Aliases
Downstream
Related
Published
2025-11-07T22:54:04.772Z
Modified
2026-04-10T04:17:30.296736Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing
Details

KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.

Database specific
{
    "cwe_ids": [
        "CWE-287"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64434.json"
}
References

Affected packages

Git / github.com/kubevirt/kubevirt

Affected ranges

Type
GIT
Repo
https://github.com/kubevirt/kubevirt
Events

Affected versions

v1.*
v1.6.0
v1.6.0-alpha.0
v1.6.0-beta.0
v1.6.0-rc.0
v1.6.0-rc.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64434.json"