KubeVirt Virtual Machine Management Add-on for Kubernetes Vulnerability
CVE-2025-64432
What is CVE-2025-64432?
A flaw in the authentication flow of KubeVirt, a virtual machine management add-on for Kubernetes, allows attackers to bypass Role-Based Access Control (RBAC) mechanisms. Specifically, the virt-api component does not properly authenticate clients when receiving API requests over mutual TLS (mTLS). This oversight arises from the failure to validate the Common Name (CN) field in client TLS certificates against the allowed values specified in the extension-apiserver-authentication configmap. Consequently, an attacker can impersonate the Kubernetes API server and directly communicate with the aggregated API server, sidestepping existing RBAC controls. The issue has been addressed in the KubeVirt versions 1.5.3 and 1.6.1.
Affected Version(s)
kubevirt < 1.5.3 < 1.5.3
kubevirt >= 1.6.0, < 1.6.1 < 1.6.0, 1.6.1
