CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
AI Analysis
Technical Summary
CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances for distributed tracing. The flaw arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. Under this configuration, the Operator automatically creates a ClusterRoleBinding that assigns the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This role grants read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. For example, a user with ClusterAdmin privileges scoped to a namespace can retrieve the token of the Tempo service account by reading the Secret object containing the token. Possession of this token allows the user to impersonate the Tempo service account and access all cluster metrics via the cluster-monitoring-view role. The vulnerability does not require user interaction and can be exploited remotely (network vector). The CVSS 3.1 base score is 4.3 (medium), reflecting low impact on confidentiality (only cluster metrics exposure), no impact on integrity or availability, and the need for some privileges to exploit. There are no known public exploits reported to date. The issue highlights the risk of overly permissive RBAC configurations combined with automatic privilege escalations by operators managing observability components in Kubernetes clusters.
Potential Impact
For European organizations, the exposure of cluster metrics can lead to leakage of sensitive operational data, potentially revealing infrastructure details, performance characteristics, and internal cluster topology. While this does not directly compromise data integrity or availability, it can aid attackers in reconnaissance and planning further attacks. Organizations with multi-tenant Kubernetes clusters or strict data privacy requirements may face compliance risks if sensitive monitoring data is exposed. The vulnerability is particularly impactful in environments where namespace-level RBAC permissions are broadly assigned, increasing the risk that a compromised or malicious user can escalate privileges. Given the growing adoption of Kubernetes and observability tools like Tempo in European enterprises, especially in sectors such as finance, telecommunications, and critical infrastructure, this vulnerability could facilitate lateral movement or targeted attacks if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
To mitigate CVE-2025-2842, European organizations should: 1) Review and tighten RBAC permissions, ensuring that 'create' permissions on TempoStack and 'get' permissions on Secrets are only granted to trusted users and service accounts. 2) Disable the Jaeger UI Monitor Tab functionality in Tempo instances if it is not strictly required, preventing the automatic creation of the ClusterRoleBinding that grants broad cluster monitoring access. 3) Monitor and audit access to Kubernetes Secrets, especially those containing service account tokens, to detect unauthorized reads. 4) Implement network segmentation and restrict access to the Kubernetes API server to minimize exposure. 5) Employ Kubernetes Pod Security Policies or OPA Gatekeeper policies to enforce least privilege principles. 6) Keep the Tempo Operator and related components updated with any patches or security advisories addressing this issue. 7) Consider using Kubernetes features like Bound Service Account Tokens to reduce token exposure risks. 8) Educate cluster administrators on the risks of granting broad namespace-level permissions and the implications of operator-managed role bindings.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor
Description
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
AI-Powered Analysis
Technical Analysis
CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances for distributed tracing. The flaw arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. Under this configuration, the Operator automatically creates a ClusterRoleBinding that assigns the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This role grants read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. For example, a user with ClusterAdmin privileges scoped to a namespace can retrieve the token of the Tempo service account by reading the Secret object containing the token. Possession of this token allows the user to impersonate the Tempo service account and access all cluster metrics via the cluster-monitoring-view role. The vulnerability does not require user interaction and can be exploited remotely (network vector). The CVSS 3.1 base score is 4.3 (medium), reflecting low impact on confidentiality (only cluster metrics exposure), no impact on integrity or availability, and the need for some privileges to exploit. There are no known public exploits reported to date. The issue highlights the risk of overly permissive RBAC configurations combined with automatic privilege escalations by operators managing observability components in Kubernetes clusters.
Potential Impact
For European organizations, the exposure of cluster metrics can lead to leakage of sensitive operational data, potentially revealing infrastructure details, performance characteristics, and internal cluster topology. While this does not directly compromise data integrity or availability, it can aid attackers in reconnaissance and planning further attacks. Organizations with multi-tenant Kubernetes clusters or strict data privacy requirements may face compliance risks if sensitive monitoring data is exposed. The vulnerability is particularly impactful in environments where namespace-level RBAC permissions are broadly assigned, increasing the risk that a compromised or malicious user can escalate privileges. Given the growing adoption of Kubernetes and observability tools like Tempo in European enterprises, especially in sectors such as finance, telecommunications, and critical infrastructure, this vulnerability could facilitate lateral movement or targeted attacks if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
To mitigate CVE-2025-2842, European organizations should: 1) Review and tighten RBAC permissions, ensuring that 'create' permissions on TempoStack and 'get' permissions on Secrets are only granted to trusted users and service accounts. 2) Disable the Jaeger UI Monitor Tab functionality in Tempo instances if it is not strictly required, preventing the automatic creation of the ClusterRoleBinding that grants broad cluster monitoring access. 3) Monitor and audit access to Kubernetes Secrets, especially those containing service account tokens, to detect unauthorized reads. 4) Implement network segmentation and restrict access to the Kubernetes API server to minimize exposure. 5) Employ Kubernetes Pod Security Policies or OPA Gatekeeper policies to enforce least privilege principles. 6) Keep the Tempo Operator and related components updated with any patches or security advisories addressing this issue. 7) Consider using Kubernetes features like Bound Service Account Tokens to reduce token exposure risks. 8) Educate cluster administrators on the risks of granting broad namespace-level permissions and the implications of operator-managed role bindings.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-03-27T02:38:55.497Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f99000acd01a249270038
Added to database: 5/22/2025, 9:37:04 PM
Last enriched: 10/11/2025, 12:30:30 AM
Last updated: 11/20/2025, 2:13:26 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13442: Command Injection in UTT 进取 750W
MediumCVE-2025-13435: Path Traversal in Dreampie Resty
MediumCVE-2025-13434: Improper Neutralization of HTTP Headers for Scripting Syntax in jameschz Hush Framework
MediumCVE-2025-13433: Unquoted Search Path in Muse Group MuseHub
HighCVE-2025-13424: SQL Injection in Campcodes Supplier Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.