Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59836: CWE-703: Improper Check or Handling of Exceptional Conditions in siderolabs omni

0
Medium
VulnerabilityCVE-2025-59836cvecve-2025-59836cwe-703cwe-476
Published: Mon Oct 13 2025 (10/13/2025, 20:43:40 UTC)
Source: CVE Database V5
Vendor/Project: siderolabs
Product: omni

Description

Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to 1.1.5 and 1.0.2, there is a nil pointer dereference vulnerability in the Omni Resource Service allows unauthenticated users to cause a server panic and denial of service by sending empty create/update resource requests through the API endpoints. The vulnerability exists in the isSensitiveSpec function which calls grpcomni.CreateResource without checking if the resource's metadata field is nil. When a resource is created with an empty Metadata field, the CreateResource function attempts to access resource.Metadata.Version causing a segmentation fault. This vulnerability is fixed in 1.1.5 and 1.0.2.

AI-Powered Analysis

AILast updated: 10/13/2025, 21:06:50 UTC

Technical Analysis

CVE-2025-59836 is a vulnerability classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) and CWE-476 (NULL Pointer Dereference) affecting siderolabs omni, a Kubernetes management platform that operates on bare metal, virtual machines, or cloud environments. The flaw exists in the Omni Resource Service's API endpoints that handle resource creation and updates. Specifically, the isSensitiveSpec function calls grpcomni.CreateResource without verifying if the resource's metadata field is non-nil. When an unauthenticated attacker sends an empty create or update resource request with a nil Metadata field, the CreateResource function attempts to access resource.Metadata.Version, resulting in a nil pointer dereference and a segmentation fault. This causes the server process to panic and crash, leading to a denial of service condition. The vulnerability affects omni versions from 1.1.0-beta.0 up to but not including 1.1.5, and all versions prior to 1.0.2. The CVSS v3.1 base score is 5.3 (medium severity), with an attack vector of network, low attack complexity, no privileges or user interaction required, and impact limited to availability loss. No known exploits have been reported in the wild as of the publication date. The issue was addressed in omni versions 1.1.5 and 1.0.2 by adding proper nil checks before accessing resource metadata fields to prevent server crashes.

Potential Impact

The primary impact of CVE-2025-59836 is a denial of service (DoS) condition caused by server crashes in the omni Kubernetes management platform. For European organizations relying on omni to orchestrate Kubernetes clusters across bare metal, virtual machines, or cloud environments, this vulnerability could disrupt cluster management operations, potentially causing downtime or degraded service availability. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can affect critical business applications and services running on Kubernetes clusters. Organizations with automated deployment pipelines or self-healing infrastructure that depend on omni's API endpoints may experience cascading failures or delays in resource provisioning. The unauthenticated nature of the exploit increases risk, as attackers do not need credentials or user interaction to trigger the DoS. This could be exploited by external threat actors or internal malicious users. The impact is particularly relevant for sectors with high dependence on cloud-native infrastructure such as finance, telecommunications, and public services in Europe.

Mitigation Recommendations

To mitigate CVE-2025-59836, European organizations should immediately upgrade all affected omni deployments to versions 1.1.5 or 1.0.2 or later, where the nil pointer dereference issue is fixed. Until upgrades can be applied, organizations should restrict network access to omni API endpoints to trusted internal networks or VPNs to reduce exposure to unauthenticated requests. Implementing Web Application Firewalls (WAFs) or API gateways with input validation can help block malformed or empty resource creation/update requests that could trigger the vulnerability. Monitoring omni service logs for panic or crash events can provide early detection of exploitation attempts. Additionally, organizations should review and harden their Kubernetes management workflows to ensure resilience against service interruptions, including automated failover and backup strategies. Security teams should also conduct penetration testing and vulnerability scanning focused on omni API endpoints to verify the absence of exploitable conditions. Finally, maintaining an up-to-date inventory of omni versions in use across the environment will facilitate timely patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-22T14:34:03.471Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed66ece828b4dd3cc6ab26

Added to database: 10/13/2025, 8:54:04 PM

Last enriched: 10/13/2025, 9:06:50 PM

Last updated: 10/15/2025, 11:20:46 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats