CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
AI Analysis
Technical Summary
CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances. The issue arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. In this configuration, the Operator automatically creates a ClusterRoleBinding that grants the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This ClusterRole provides read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. Under these conditions, the attacker can retrieve the token of the Tempo service account by reading the Secret associated with it. Possession of this token allows the attacker to impersonate the Tempo service account and access all cluster metrics, potentially exposing sensitive monitoring data. The vulnerability does not allow modification or disruption of cluster resources, only unauthorized read access to metrics. The CVSS 3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and no impact on integrity or availability. Exploitation requires some level of privilege within the namespace but no user interaction. There are no known public exploits or active exploitation reported at this time. The vulnerability highlights the risk of over-permissive RBAC configurations and the need for careful management of service account tokens and Secret access in Kubernetes environments.
Potential Impact
For European organizations, the exposure of cluster metrics can lead to information disclosure about infrastructure, workloads, and performance characteristics, which could aid attackers in reconnaissance and subsequent targeted attacks. Organizations relying on Kubernetes clusters with Tempo Operator and Jaeger UI Monitor Tab enabled may inadvertently expose sensitive monitoring data if namespace permissions are not tightly controlled. While the vulnerability does not allow direct disruption or data modification, the leakage of operational metrics can reveal system weaknesses or usage patterns. This could be particularly impactful for sectors with strict data protection requirements or critical infrastructure, such as finance, healthcare, and energy. Additionally, the exposure of cluster metrics may violate compliance requirements related to confidentiality of operational data. The medium severity rating suggests a moderate risk, but the actual impact depends on the specific cluster configurations and privilege assignments within the organization’s Kubernetes environment.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Review and restrict RBAC permissions to ensure that users or service accounts do not have unnecessary 'create' permissions on TempoStack resources or 'get' permissions on Secrets within namespaces. 2) Limit access to the Tempo service account token by restricting Secret read permissions only to trusted entities. 3) Consider disabling the Jaeger UI Monitor Tab functionality in the Tempo Operator if it is not required, as this feature triggers the creation of the risky ClusterRoleBinding. 4) Implement Kubernetes RBAC best practices by applying the principle of least privilege, especially around Secret access and cluster monitoring roles. 5) Monitor audit logs for unusual access patterns to Secrets and TempoStack resources. 6) Stay updated with vendor patches or advisories related to Tempo Operator and apply them promptly once available. 7) Use network policies and pod security policies to further isolate sensitive components and reduce the attack surface. 8) Conduct regular security reviews of Kubernetes cluster configurations and service account bindings to detect and remediate over-permissive access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor
Description
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
AI-Powered Analysis
Technical Analysis
CVE-2025-2842 is a vulnerability discovered in the Tempo Operator, a Kubernetes operator managing Tempo instances. The issue arises when the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Operator. In this configuration, the Operator automatically creates a ClusterRoleBinding that grants the cluster-monitoring-view ClusterRole to the Service Account used by the Tempo instance. This ClusterRole provides read access to cluster metrics, which are sensitive operational data. The vulnerability can be exploited if an attacker or user has 'create' permissions on TempoStack resources and 'get' permissions on Kubernetes Secrets within a namespace. Under these conditions, the attacker can retrieve the token of the Tempo service account by reading the Secret associated with it. Possession of this token allows the attacker to impersonate the Tempo service account and access all cluster metrics, potentially exposing sensitive monitoring data. The vulnerability does not allow modification or disruption of cluster resources, only unauthorized read access to metrics. The CVSS 3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and no impact on integrity or availability. Exploitation requires some level of privilege within the namespace but no user interaction. There are no known public exploits or active exploitation reported at this time. The vulnerability highlights the risk of over-permissive RBAC configurations and the need for careful management of service account tokens and Secret access in Kubernetes environments.
Potential Impact
For European organizations, the exposure of cluster metrics can lead to information disclosure about infrastructure, workloads, and performance characteristics, which could aid attackers in reconnaissance and subsequent targeted attacks. Organizations relying on Kubernetes clusters with Tempo Operator and Jaeger UI Monitor Tab enabled may inadvertently expose sensitive monitoring data if namespace permissions are not tightly controlled. While the vulnerability does not allow direct disruption or data modification, the leakage of operational metrics can reveal system weaknesses or usage patterns. This could be particularly impactful for sectors with strict data protection requirements or critical infrastructure, such as finance, healthcare, and energy. Additionally, the exposure of cluster metrics may violate compliance requirements related to confidentiality of operational data. The medium severity rating suggests a moderate risk, but the actual impact depends on the specific cluster configurations and privilege assignments within the organization’s Kubernetes environment.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Review and restrict RBAC permissions to ensure that users or service accounts do not have unnecessary 'create' permissions on TempoStack resources or 'get' permissions on Secrets within namespaces. 2) Limit access to the Tempo service account token by restricting Secret read permissions only to trusted entities. 3) Consider disabling the Jaeger UI Monitor Tab functionality in the Tempo Operator if it is not required, as this feature triggers the creation of the risky ClusterRoleBinding. 4) Implement Kubernetes RBAC best practices by applying the principle of least privilege, especially around Secret access and cluster monitoring roles. 5) Monitor audit logs for unusual access patterns to Secrets and TempoStack resources. 6) Stay updated with vendor patches or advisories related to Tempo Operator and apply them promptly once available. 7) Use network policies and pod security policies to further isolate sensitive components and reduce the attack surface. 8) Conduct regular security reviews of Kubernetes cluster configurations and service account bindings to detect and remediate over-permissive access.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-03-27T02:38:55.497Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f99000acd01a249270038
Added to database: 5/22/2025, 9:37:04 PM
Last enriched: 11/20/2025, 9:49:16 PM
Last updated: 1/7/2026, 4:24:30 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.