Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2786: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2786cvecve-2025-2786
Published: Wed Apr 02 2025 (04/02/2025, 11:07:43 UTC)
Source: CVE

Description

CVE-2025-2786 is a medium-severity vulnerability in Tempo Operator that allows a user with full access to their namespace to extract a ServiceAccount token and perform TokenReview and SubjectAccessReview requests. This exposure can reveal sensitive information about other users' permissions within the cluster. Although it does not enable privilege escalation or impersonation, the information disclosure could facilitate further targeted attacks. The vulnerability affects deployments of TempoStack or TempoMonolithic instances where the operator creates certain Kubernetes RBAC resources. No known exploits are currently reported in the wild. European organizations using Tempo Operator in Kubernetes environments should be aware of this risk and apply mitigations promptly to prevent information leakage. The vulnerability has a CVSS score of 4. 3, reflecting its limited but meaningful impact on confidentiality without affecting integrity or availability.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:51:49 UTC

Technical Analysis

CVE-2025-2786 is a vulnerability identified in the Tempo Operator, a Kubernetes operator used to deploy TempoStack or TempoMonolithic instances. When a user deploys these instances, the operator automatically creates a ServiceAccount, ClusterRole, and ClusterRoleBinding. The flaw lies in the fact that a user who already has full access to their own Kubernetes namespace can extract the ServiceAccount token associated with these resources. With this token, the user can submit TokenReview and SubjectAccessReview API requests to the Kubernetes API server. These requests allow the user to query and reveal information about the permissions and roles assigned to other users within the cluster. Although this vulnerability does not permit privilege escalation or impersonation of other users, the exposure of permission data can aid attackers in reconnaissance and planning further attacks. The vulnerability is classified as medium severity with a CVSS 3.1 score of 4.3, primarily due to its impact on confidentiality and the fact that it requires the attacker to have namespace-level privileges already. There is no indication of known exploits in the wild, and no patches or vendor advisories were provided at the time of publication. The vulnerability affects all versions of the Tempo Operator as indicated by the affectedVersions field containing "0", which likely denotes initial or unspecified versions. The flaw is relevant in Kubernetes environments where Tempo Operator is used to manage observability stacks, and it leverages Kubernetes RBAC mechanisms to expose sensitive authorization data.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information disclosure within Kubernetes clusters running Tempo Operator. Attackers with namespace-level access can gain insight into the permissions of other users, potentially revealing privileged roles or service accounts that could be targeted in subsequent attacks. While it does not directly allow privilege escalation, the information leakage can facilitate lateral movement or privilege abuse by revealing the cluster's security posture. Organizations relying on Tempo Operator for observability in critical infrastructure or regulated environments (such as finance, healthcare, or government) may face increased risk of targeted attacks or compliance issues related to unauthorized data exposure. The vulnerability could also undermine trust in multi-tenant Kubernetes clusters where namespace isolation is expected. Given the growing adoption of Kubernetes and observability tools across Europe, this vulnerability could impact a broad range of sectors, especially those with complex cloud-native deployments.

Mitigation Recommendations

To mitigate CVE-2025-2786, organizations should first ensure strict access control policies are enforced at the namespace level to limit who can deploy Tempo Operator instances. Restricting namespace-level full access reduces the pool of potential attackers who can exploit this flaw. Additionally, review and minimize the permissions granted to the ServiceAccount, ClusterRole, and ClusterRoleBinding created by the operator to follow the principle of least privilege. If possible, configure the operator or deployment manifests to avoid creating overly permissive RBAC bindings. Monitoring and auditing Kubernetes API server logs for unusual TokenReview and SubjectAccessReview requests can help detect exploitation attempts. Organizations should also track vendor advisories for patches or updates to the Tempo Operator that address this vulnerability and apply them promptly. In the interim, consider isolating observability workloads in dedicated clusters or namespaces with tightly controlled access. Finally, educate DevOps and security teams about the risks of token exposure and the importance of securing Kubernetes RBAC configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-25T10:51:16.783Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270036

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 1/21/2026, 2:51:49 AM

Last updated: 2/7/2026, 6:34:02 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats