๐Ÿ” CVE Alert

CVE-2025-54469

CRITICAL 9.9

NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow

CVSS Score
9.9
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitising their values. The entry process of the enforcer container is the monitor process. When the enforcer container stops, the monitor process checks whether the consul subprocess has exited. To perform this check, the monitor process uses the popen function to execute a shell command that determines whether the ports used by the consul subprocess are still active. The values of environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT are used directly to compose shell commands via popen without validation or sanitization. This behavior could allow a malicious user to inject malicious commands through these variables within the enforcer container.

CWE CWE-78
Vendor suse
Product neuvector
Published Oct 30, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for suse neuvector

Be the first to know when new critical vulnerabilities affecting suse neuvector are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

SUSE / neuvector
5.3.0 < 5.3.5 5.4.0 < 5.4.7 0.0.0-20230727023453-1c4957d53911 < 0.0.0-20251020133207-084a437033b4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bugzilla.suse.com: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-54469 github.com: https://github.com/neuvector/neuvector/security/advisories/GHSA-c8g6-qrwh-m3vp