Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2786: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2786cvecve-2025-2786
Published: Wed Apr 02 2025 (04/02/2025, 11:07:43 UTC)
Source: CVE

Description

A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:06:00 UTC

Technical Analysis

CVE-2025-2786 is a vulnerability identified in the Tempo Operator, a Kubernetes operator used to deploy TempoStack or TempoMonolithic instances. When a user deploys these instances, the operator automatically creates a ServiceAccount along with associated ClusterRole and ClusterRoleBinding resources. The flaw lies in the fact that a user who already has full access to their namespace can extract the ServiceAccount token from these resources. This token can then be used to submit TokenReview and SubjectAccessReview API requests to the Kubernetes API server. These requests allow the user to query and obtain information about other users' permissions and roles within the cluster. While this vulnerability does not permit privilege escalation or impersonation of other users, it leaks sensitive authorization data that could be leveraged for reconnaissance and planning of subsequent attacks. The vulnerability is rated with a CVSS 3.1 score of 4.3 (medium severity), reflecting its limited impact on confidentiality and no impact on integrity or availability. Exploitation requires the attacker to have namespace-level privileges, which limits the attack surface but still poses a risk in multi-tenant or shared cluster environments. No patches or exploits are currently reported, but awareness and mitigation are advised.

Potential Impact

The primary impact of CVE-2025-2786 is the unauthorized disclosure of sensitive authorization information within Kubernetes clusters using Tempo Operator. Attackers with namespace-level access can gain insight into other users' permissions, potentially aiding in lateral movement or privilege escalation attempts through social engineering or targeted exploits. Although direct privilege escalation is not possible via this vulnerability, the information exposure can reduce the security posture by revealing cluster role assignments and access patterns. Organizations running Tempo Operator in multi-tenant or shared Kubernetes environments are particularly at risk, as attackers could map out permission boundaries and identify high-value targets. This could lead to more sophisticated attacks, data breaches, or disruption if combined with other vulnerabilities. The impact is less severe in single-tenant or tightly controlled environments where namespace access is strictly limited.

Mitigation Recommendations

To mitigate CVE-2025-2786, organizations should implement the following specific measures: 1) Restrict namespace-level permissions to only trusted users and service accounts, minimizing who can deploy TempoStack or TempoMonolithic instances. 2) Audit and monitor ServiceAccount token usage and API requests related to TokenReview and SubjectAccessReview to detect suspicious activity. 3) Employ Kubernetes Role-Based Access Control (RBAC) best practices to enforce least privilege, ensuring users cannot extract tokens unnecessarily. 4) If possible, update to a patched version of Tempo Operator once available or apply vendor-provided workarounds to prevent token extraction. 5) Use network policies and API server request filtering to limit access to sensitive Kubernetes API endpoints. 6) Consider isolating workloads in separate clusters or namespaces with strict boundaries to reduce the blast radius. 7) Regularly review cluster role bindings and service account permissions to identify and remediate over-privileged entities. These steps go beyond generic advice by focusing on controlling token exposure and monitoring specific API interactions related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-25T10:51:16.783Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270036

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 3/23/2026, 12:06:00 AM

Last updated: 3/25/2026, 3:02:36 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses