Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2786: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2786cvecve-2025-2786
Published: Wed Apr 02 2025 (04/02/2025, 11:07:43 UTC)
Source: CVE

Description

A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:48:53 UTC

Technical Analysis

CVE-2025-2786 is a vulnerability identified in the Tempo Operator, a Kubernetes operator used to deploy TempoStack or TempoMonolithic instances. When a user deploys these instances, the operator automatically creates a ServiceAccount, ClusterRole, and ClusterRoleBinding. The flaw lies in the fact that a user with full access to their own namespace can extract the ServiceAccount token associated with these resources. This token can then be used to submit TokenReview and SubjectAccessReview API requests to the Kubernetes API server. These requests allow the user to query the permissions and roles assigned to other users or service accounts within the cluster, effectively exposing sensitive authorization information. Importantly, this vulnerability does not permit privilege escalation or impersonation of other users; it solely leaks information about user permissions. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the network attack vector, low complexity, and requirement for privileges at the namespace level. The vulnerability does not require user interaction and affects the confidentiality of authorization data but does not impact integrity or availability. No patches or exploits are currently reported, but the information disclosure could facilitate reconnaissance for more targeted attacks in Kubernetes environments using Tempo Operator.

Potential Impact

For European organizations, the exposure of sensitive authorization information can undermine the security posture of Kubernetes clusters running Tempo Operator. Attackers or malicious insiders with namespace-level access could leverage this information to map out user permissions and roles, aiding in the planning of privilege escalation or lateral movement attacks. This is particularly concerning for organizations with multi-tenant Kubernetes clusters or those that rely heavily on RBAC for access control. The leak of permission data could also violate data protection regulations if it leads to unauthorized access or data breaches. While the vulnerability does not directly allow privilege escalation, the reconnaissance advantage it provides could increase the risk of subsequent, more damaging attacks. Organizations in sectors with stringent compliance requirements, such as finance, healthcare, and critical infrastructure, may face increased risk and regulatory scrutiny if such vulnerabilities are exploited.

Mitigation Recommendations

To mitigate CVE-2025-2786, organizations should: 1) Restrict namespace-level privileges strictly to trusted users and service accounts, minimizing who can deploy TempoStack or TempoMonolithic instances. 2) Implement strict RBAC policies that limit the ability to extract ServiceAccount tokens or perform TokenReview and SubjectAccessReview requests. 3) Monitor Kubernetes audit logs for unusual TokenReview or SubjectAccessReview API calls that could indicate reconnaissance activity. 4) Use Kubernetes features such as Bound ServiceAccount Tokens or TokenRequest API with limited scopes to reduce token misuse. 5) Keep Tempo Operator and related components updated; although no patch links are currently provided, monitor vendor advisories for fixes. 6) Consider network segmentation and API server access controls to limit exposure of sensitive API endpoints. 7) Conduct regular security assessments and penetration tests focusing on Kubernetes RBAC configurations and operator deployments to detect similar information disclosure risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-25T10:51:16.783Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270036

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 11/20/2025, 9:48:53 PM

Last updated: 1/7/2026, 8:57:17 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats