Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8077: CWE-1393: Use of Default Password in SUSE neuvector

0
Critical
VulnerabilityCVE-2025-8077cvecve-2025-8077cwe-1393
Published: Wed Sep 17 2025 (09/17/2025, 12:33:37 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: neuvector

Description

A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:21:01 UTC

Technical Analysis

CVE-2025-8077 is a critical security vulnerability identified in SUSE NeuVector, a container security platform, affecting versions up to and including 5.4.5. The root cause is the use of a fixed, hardcoded default password for the built-in 'admin' account, classified under CWE-1393 (Use of Default Password). This default password is intended for initial setup but if not changed immediately after deployment, it creates a severe security risk. Any workload within the Kubernetes or container cluster that has network access to the NeuVector service can authenticate using these default credentials without any prior authentication or user interaction. Upon successful authentication, the attacker obtains an authentication token that grants full administrative privileges via NeuVector APIs. This enables the attacker to perform any operation, including modifying security policies, disabling protections, or extracting sensitive information about container workloads and network traffic. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the simplicity of exploitation and the critical nature of the affected component make this a high-risk vulnerability. NeuVector is widely used in containerized environments for runtime security and network segmentation, making this vulnerability particularly dangerous in cloud-native and hybrid cloud deployments. The vulnerability was publicly disclosed on September 17, 2025, with no patch links currently available, emphasizing the urgency for immediate mitigation by changing default credentials and monitoring access.

Potential Impact

The impact of CVE-2025-8077 is severe for organizations deploying SUSE NeuVector in containerized environments. Exploitation allows attackers to gain full administrative access to the NeuVector platform, compromising the security posture of the entire container cluster. This can lead to unauthorized modification or disabling of security policies, exposure of sensitive container workload data, and potential lateral movement within the cluster. The confidentiality, integrity, and availability of containerized applications and their data are at high risk. Organizations relying on NeuVector for network segmentation and runtime protection may find their defenses bypassed, increasing the likelihood of further exploitation such as container escape, data exfiltration, or service disruption. Given the criticality and ease of exploitation, this vulnerability could be leveraged in targeted attacks against cloud-native infrastructure, impacting industries with high container adoption such as technology, finance, healthcare, and government sectors worldwide.

Mitigation Recommendations

To mitigate CVE-2025-8077, organizations should immediately change the default password of the built-in 'admin' account in NeuVector upon deployment. This should be enforced as a mandatory step in deployment automation and configuration management processes. Network access to the NeuVector management interfaces should be restricted using network policies or firewall rules to limit exposure to trusted workloads only. Implement strong authentication mechanisms such as integrating NeuVector with centralized identity providers (e.g., LDAP, OAuth) if supported, to eliminate reliance on static credentials. Regularly audit and monitor NeuVector API access logs for unauthorized or suspicious activity. Employ runtime security controls to detect anomalous behavior within container workloads that might indicate exploitation attempts. Stay informed about vendor updates and apply patches promptly once available. Additionally, consider deploying NeuVector in a least-privilege mode and segmenting the container network to reduce the blast radius in case of compromise. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-07-23T08:11:06.216Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68caac2dd82284c39e479277

Added to database: 9/17/2025, 12:40:13 PM

Last enriched: 2/27/2026, 4:21:01 AM

Last updated: 3/25/2026, 8:56:23 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses