Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2842cvecve-2025-2842
Published: Wed Apr 02 2025 (04/02/2025, 11:09:55 UTC)
Source: CVE

Description

A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:49:16 UTC

Technical Analysis

CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances. The issue arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. In this configuration, the Operator automatically creates a ClusterRoleBinding that grants the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This ClusterRole provides read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. Under these conditions, the attacker can retrieve the token of the Tempo service account by reading the Secret associated with it. Possession of this token allows the attacker to impersonate the Tempo service account and access all cluster metrics, potentially exposing sensitive monitoring data. The vulnerability does not allow modification or disruption of cluster resources, only unauthorized read access to metrics. The CVSS 3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and no impact on integrity or availability. Exploitation requires some level of privilege within the namespace but no user interaction. There are no known public exploits or active exploitation reported at this time. The vulnerability highlights the risk of over-permissive RBAC configurations and the need for careful management of service account tokens and Secret access in Kubernetes environments.

Potential Impact

For European organizations, the exposure of cluster metrics can lead to information disclosure about infrastructure, workloads, and performance characteristics, which could aid attackers in reconnaissance and subsequent targeted attacks. Organizations relying on Kubernetes clusters with Tempo Operator and Jaeger UI Monitor Tab enabled may inadvertently expose sensitive monitoring data if namespace permissions are not tightly controlled. While the vulnerability does not allow direct disruption or data modification, the leakage of operational metrics can reveal system weaknesses or usage patterns. This could be particularly impactful for sectors with strict data protection requirements or critical infrastructure, such as finance, healthcare, and energy. Additionally, the exposure of cluster metrics may violate compliance requirements related to confidentiality of operational data. The medium severity rating suggests a moderate risk, but the actual impact depends on the specific cluster configurations and privilege assignments within the organization’s Kubernetes environment.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Review and restrict RBAC permissions to ensure that users or service accounts do not have unnecessary 'create' permissions on TempoStack resources or 'get' permissions on Secrets within namespaces. 2) Limit access to the Tempo service account token by restricting Secret read permissions only to trusted entities. 3) Consider disabling the Jaeger UI Monitor Tab functionality in the Tempo Operator if it is not required, as this feature triggers the creation of the risky ClusterRoleBinding. 4) Implement Kubernetes RBAC best practices by applying the principle of least privilege, especially around Secret access and cluster monitoring roles. 5) Monitor audit logs for unusual access patterns to Secrets and TempoStack resources. 6) Stay updated with vendor patches or advisories related to Tempo Operator and apply them promptly once available. 7) Use network policies and pod security policies to further isolate sensitive components and reduce the attack surface. 8) Conduct regular security reviews of Kubernetes cluster configurations and service account bindings to detect and remediate over-permissive access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-27T02:38:55.497Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270038

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 11/20/2025, 9:49:16 PM

Last updated: 1/7/2026, 4:24:30 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats