{
  "affected": [
    {}
  ],
  "aliases": [
    "GHSA-qqj3-g7mx-5p4w"
  ],
  "details": "This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.\n\n\nIn affected versions, NeuVector does not enforce TLS \ncertificate verification when transmitting anonymous cluster data to the\n telemetry server. As a result, the communication channel is susceptible\n to man-in-the-middle (MITM) attacks, where an attacker could intercept \nor modify the transmitted data. Additionally, NeuVector loads the \nresponse of the telemetry server is loaded into memory without size \nlimitation, which makes  it vulnerable to a Denial of Service(DoS) \nattack",
  "id": "CVE-2025-54470",
  "modified": "2026-03-10T21:51:12.216442218Z",
  "published": "2025-10-30T10:15:35.257Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/neuvector/neuvector/security/advisories/GHSA-qqj3-g7mx-5p4w"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-54470"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
      "type": "CVSS_V3"
    }
  ]
}