Upstream information
Description
This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.In affected versions, NeuVector does not enforce TLS
certificate verification when transmitting anonymous cluster data to the
telemetry server. As a result, the communication channel is susceptible
to man-in-the-middle (MITM) attacks, where an attacker could intercept
or modify the transmitted data. Additionally, NeuVector loads the
response of the telemetry server is loaded into memory without size
limitation, which makes it vulnerable to a Denial of Service(DoS)
attack
Upstream Security Advisories:
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
| CVSS detail | CNA (SUSE) | SUSE | 
|---|---|---|
| Base Score | 8.6 | 8.6 | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H | 
| Attack Vector | Network | Network | 
| Attack Complexity | Low | Low | 
| Privileges Required | None | None | 
| User Interaction | None | None | 
| Scope | Unchanged | Unchanged | 
| Confidentiality Impact | Low | Low | 
| Integrity Impact | Low | Low | 
| Availability Impact | High | High | 
| CVSSv3 Version | 3.1 | 3.1 | 
SUSE Security Advisories:
- GHSA-qqj3-g7mx-5p4w, published Tue Oct 21 20:59:05 CEST 2025
 
SUSE Timeline for this CVE
CVE page created: Mon Sep 8 17:55:11 2025CVE page last modified: Thu Oct 30 14:45:50 2025