Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2842cvecve-2025-2842
Published: Wed Apr 02 2025 (04/02/2025, 11:09:55 UTC)
Source: CVE

Description

A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.

AI-Powered Analysis

AILast updated: 10/11/2025, 00:30:30 UTC

Technical Analysis

CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances for distributed tracing. The flaw arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. Under this configuration, the Operator automatically creates a ClusterRoleBinding that assigns the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This role grants read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. For example, a user with ClusterAdmin privileges scoped to a namespace can retrieve the token of the Tempo service account by reading the Secret object containing the token. Possession of this token allows the user to impersonate the Tempo service account and access all cluster metrics via the cluster-monitoring-view role. The vulnerability does not require user interaction and can be exploited remotely (network vector). The CVSS 3.1 base score is 4.3 (medium), reflecting low impact on confidentiality (only cluster metrics exposure), no impact on integrity or availability, and the need for some privileges to exploit. There are no known public exploits reported to date. The issue highlights the risk of overly permissive RBAC configurations combined with automatic privilege escalations by operators managing observability components in Kubernetes clusters.

Potential Impact

For European organizations, the exposure of cluster metrics can lead to leakage of sensitive operational data, potentially revealing infrastructure details, performance characteristics, and internal cluster topology. While this does not directly compromise data integrity or availability, it can aid attackers in reconnaissance and planning further attacks. Organizations with multi-tenant Kubernetes clusters or strict data privacy requirements may face compliance risks if sensitive monitoring data is exposed. The vulnerability is particularly impactful in environments where namespace-level RBAC permissions are broadly assigned, increasing the risk that a compromised or malicious user can escalate privileges. Given the growing adoption of Kubernetes and observability tools like Tempo in European enterprises, especially in sectors such as finance, telecommunications, and critical infrastructure, this vulnerability could facilitate lateral movement or targeted attacks if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

To mitigate CVE-2025-2842, European organizations should: 1) Review and tighten RBAC permissions, ensuring that 'create' permissions on TempoStack and 'get' permissions on Secrets are only granted to trusted users and service accounts. 2) Disable the Jaeger UI Monitor Tab functionality in Tempo instances if it is not strictly required, preventing the automatic creation of the ClusterRoleBinding that grants broad cluster monitoring access. 3) Monitor and audit access to Kubernetes Secrets, especially those containing service account tokens, to detect unauthorized reads. 4) Implement network segmentation and restrict access to the Kubernetes API server to minimize exposure. 5) Employ Kubernetes Pod Security Policies or OPA Gatekeeper policies to enforce least privilege principles. 6) Keep the Tempo Operator and related components updated with any patches or security advisories addressing this issue. 7) Consider using Kubernetes features like Bound Service Account Tokens to reduce token exposure risks. 8) Educate cluster administrators on the risks of granting broad namespace-level permissions and the implications of operator-managed role bindings.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-27T02:38:55.497Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270038

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 10/11/2025, 12:30:30 AM

Last updated: 11/20/2025, 2:13:26 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats