CVE-2025-64436
BaseFortify
Publication date: 2025-11-07
Last updated on: 2025-11-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kubevirt | kubevirt | to 1.5.3 (inc) |
| kubevirt | kubevirt | From 1.6.0 (inc) to 1.6.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-276 | During installation, installed file permissions are set to allow anyone to modify those files. |
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in KubeVirt versions 1.5.0 and earlier involves excessive permissions granted to the virt-handler service account. These permissions, such as updating Virtual Machine Instances (VMI) and patching nodes, can be exploited by an attacker to force a VMI migration to a node controlled by the attacker. Additionally, the attacker could mark all nodes as unschedulable, potentially forcing migration or creation of privileged pods onto a compromised node.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to manipulate the scheduling and migration of virtual machines within a Kubernetes cluster, potentially directing workloads to attacker-controlled or compromised nodes. This could lead to unauthorized access, privilege escalation, or disruption of services by forcing privileged pods onto compromised nodes.