๐Ÿ” CVE Alert

CVE-2024-12582

HIGH 7.1

Skupper: skupper-cli: flawed authentication method may lead to arbitrary file read or denial of service

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the skupper console, a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the "admin" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.

CWE CWE-305
Published Dec 24, 2024
Last Updated Nov 20, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
High

Affected Versions

Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected
Red Hat / Service Interconnect 1 for RHEL 9
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1413 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-12582 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2333540