{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "1.5.3"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4f27e414aa0e7c805b04911902b888bc9c3b2f82"
            }
          ],
          "repo": "https://github.com/kubevirt/kubevirt",
          "type": "GIT"
        },
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "1.6.0-alpha.0"
              },
              {
                "fixed": "1.6.1"
              }
            ]
          },
          "events": [
            {
              "introduced": "9a683cafb00c2f919e3fc8e259df1030893a4b13"
            },
            {
              "fixed": "00d03e43e3bf03e563136695a4732b65ed42d764"
            }
          ],
          "repo": "https://github.com/kubevirt/kubevirt",
          "type": "GIT"
        }
      ]
    }
  ],
  "aliases": [
    "GHSA-ggp9-c99x-54gp"
  ],
  "database_specific": {
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
      "CWE-287"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64434.json"
  },
  "details": "KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.",
  "id": "CVE-2025-64434",
  "modified": "2026-04-01T23:09:27.131138638Z",
  "published": "2025-11-07T22:54:04.772Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64434.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/kubevirt/kubevirt/security/advisories/GHSA-ggp9-c99x-54gp"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64434"
    },
    {
      "type": "FIX",
      "url": "https://github.com/kubevirt/kubevirt/commit/231dc69723f331dc02f65a31ab4c3d6869f40d6a"
    },
    {
      "type": "FIX",
      "url": "https://github.com/kubevirt/kubevirt/commit/af2f08a9a186eccc650f87c30ab3e07b669e8b5b"
    },
    {
      "type": "FIX",
      "url": "https://github.com/kubevirt/kubevirt/commit/b9773bc588e6e18ece896a2dad5336ef7a653074"
    }
  ],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing"
}