Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor

0
Medium
VulnerabilityCVE-2025-2842cvecve-2025-2842
Published: Wed Apr 02 2025 (04/02/2025, 11:09:55 UTC)
Source: CVE

Description

A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:06:18 UTC

Technical Analysis

CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, specifically when the Jaeger UI Monitor Tab functionality is enabled. The Tempo Operator, responsible for managing Tempo instances in Kubernetes clusters, creates a ClusterRoleBinding that assigns the cluster-monitoring-view ClusterRole to the service account used by the Tempo instance. This role grants read access to cluster metrics, which are sensitive operational data. The vulnerability arises because a user who has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace can retrieve the token of the Tempo service account by reading the Secret associated with it. With this token, the attacker can impersonate the Tempo service account and access all cluster metrics that the cluster-monitoring-view ClusterRole permits. This scenario typically requires the user to have elevated privileges within a namespace, such as ClusterAdmin permissions scoped to that namespace. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 4.3 (medium), reflecting the limited scope and required privileges for exploitation. No integrity or availability impacts are reported, and no known exploits have been observed in the wild. The flaw highlights the risk of over-privileging service accounts and the importance of strict RBAC controls in Kubernetes environments.

Potential Impact

The primary impact of CVE-2025-2842 is the unauthorized disclosure of sensitive cluster metrics, which can reveal detailed operational and performance information about the Kubernetes environment. Such information could be leveraged by attackers for reconnaissance, aiding in further attacks or lateral movement within the cluster. While the vulnerability does not directly compromise data integrity or availability, the exposure of monitoring data can undermine security posture and operational confidentiality. Organizations with multi-tenant clusters or those that delegate namespace-level admin privileges are particularly at risk, as attackers with limited but sufficient permissions can escalate their visibility. This could lead to increased risk of targeted attacks or exploitation of other vulnerabilities based on the exposed metrics. The vulnerability also underscores the risk of excessive permissions granted by default configurations, which may not align with the principle of least privilege. Although no active exploitation is reported, the presence of this vulnerability in environments using Tempo Operator with Jaeger UI monitoring enabled could attract attackers seeking to gather intelligence on cluster operations.

Mitigation Recommendations

To mitigate CVE-2025-2842, organizations should first assess whether the Jaeger UI Monitor Tab functionality is enabled in their Tempo Operator deployments. If not required, disabling this feature will prevent the creation of the problematic ClusterRoleBinding. For environments that require this functionality, administrators should carefully audit and restrict permissions on TempoStack resources and Kubernetes Secrets within namespaces. Specifically, avoid granting 'create' permissions on TempoStack and 'get' permissions on Secrets to users or service accounts unless absolutely necessary. Implement strict RBAC policies that enforce the principle of least privilege, limiting access to only those users who require it for their role. Additionally, consider monitoring and alerting on unusual access patterns to Secrets and service account tokens. Regularly update the Tempo Operator to the latest versions once patches addressing this vulnerability are released. Employ network segmentation and Kubernetes Pod Security Policies or OPA Gatekeeper policies to further restrict access to sensitive resources. Finally, conduct periodic security reviews of cluster roles and bindings to detect and remediate over-privileged accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-27T02:38:55.497Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f99000acd01a249270038

Added to database: 5/22/2025, 9:37:04 PM

Last enriched: 3/23/2026, 12:06:18 AM

Last updated: 3/25/2026, 1:41:44 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses