Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Red Hat OpenShift Virtualization 4

Source -

CNA

CNA CVEs -

13

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
13Vulnerabilities found

CVE-2025-14525
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 3.63%
||
7 Day CHG~0.00%
Published-26 Jan, 2026 | 19:36
Updated-27 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kubevirt: kubevirt: vm administration denial of service via guest agent

A flaw was found in kubevirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system's ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI). This allows the VM user to restrict the VM administrator's ability to manage the VM, leading to a denial of service for administrative operations.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Virtualization 4
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-14459
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.90%
||
7 Day CHG~0.00%
Published-26 Jan, 2026 | 19:36
Updated-27 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Virt-cdi-controller: unauthorized pvc cloning via dataimportcron

A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechanism.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Virtualization 4RHEL-9-CNV-4.19
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-14946
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 13:02
Updated-22 Dec, 2025 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri

A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 8libnbdRed Hat OpenShift Virtualization 4Red Hat Enterprise Linux 10Red Hat Enterprise Linux 9
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-57848
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.01% / 0.46%
||
7 Day CHG~0.00%
Published-23 Oct, 2025 | 20:10
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Container-native-virtualization: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Virtualization 4
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-7195
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.00% / 0.18%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 19:05
Updated-27 Feb, 2026 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd

Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-operator-frameworkRed Hat, Inc.
Product-Red Hat OpenShift Container Platform 4File Integrity Operator 1multicluster engine for Kubernetes 2.9Multicluster Engine for KubernetesRed Hat Advanced Cluster Security 4Red Hat Advanced Cluster Management for Kubernetes 2.14Red Hat Openshift Data Foundation 4.15Red Hat Openshift Data Foundation 4.16Compliance Operator 1Red Hat Advanced Cluster Management for Kubernetes 2.12Red Hat Advanced Cluster Management for Kubernetes 2.11Red Hat Advanced Cluster Management for Kubernetes 2.13RHEL-9-CNV-4.17Multicluster Global Huboperator-sdkmulticluster engine for Kubernetes 2.6RHEL-9-CNV-4.20Red Hat Openshift Data Foundation 4.17Red Hat Advanced Cluster Management for Kubernetes 2Red Hat Openshift Data Foundation 4.14Red Hat build of Apicurio Registry 2Red Hat build of Apicurio Registry 3multicluster engine for Kubernetes 2.7Red Hat Fuse 7Red Hat OpenShift Virtualization 4RHEL-9-CNV-4.18Red Hat Web TerminalRed Hat Openshift Data Foundation 4.18multicluster engine for Kubernetes 2.8
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-8556
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.03% / 7.62%
||
7 Day CHG+0.01%
Published-06 Aug, 2025 | 08:48
Updated-25 Feb, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Github.com/cloudflare/circl: circl-fourq: missing and wrong validation can lead to incorrect results

A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Builds for Red Hat OpenShiftOpenShift ServerlessRed Hat OpenStack Platform 17.1Red Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4Red Hat Developer HubRed Hat OpenShift GitOpsCustom Metric Autoscaler operator for Red Hat OpenshiftRed Hat Trusted Application PipelineRed Hat Trusted Profile AnalyzerOpenShift Service Mesh 3Red Hat Advanced Cluster Security 4Red Hat OpenStack Platform 16.2Multicluster Global HubOpenShift PipelinesRed Hat Ceph Storage 6Red Hat OpenShift AI (RHOAI)Red Hat Advanced Cluster Management for Kubernetes 2Red Hat Trusted Artifact SignerRed Hat OpenShift for Windows ContainersRed Hat Ceph Storage 8Red Hat OpenShift Virtualization 4Red Hat Enterprise Linux AI (RHEL AI)Red Hat Ceph Storage 5Red Hat Edge Manager previewRed Hat Enterprise Linux 9Red Hat OpenShift Dev Workspaces Operator
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CVE-2024-9355
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 18:17
Updated-03 Feb, 2026 | 22:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Golang-fips: golang fips zeroed buffer

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 7Red Hat Enterprise Linux 7 Extended Lifecycle SupportSatellite Client 6 for RHEL 10Satellite Client 6 for RHEL 8Red Hat OpenShift GitOpsRed Hat Satellite 6OpenShift Developer Tools and ServicesRed Hat Ansible Automation Platform 1.2Red Hat OpenShift Virtualization 4Red Hat Trusted Artifact SignerStreams for Apache Kafka 2.9.0Red Hat OpenShift Container Platform 4Red Hat Openshift Container Storage 4Red Hat Enterprise Linux 9Red Hat Openshift Data Foundation 4Satellite Client 6 for RHEL 9Red Hat Enterprise Linux 8Red Hat Ansible Automation Platform 2OpenShift PipelinesRed Hat OpenStack Platform 16.2Red Hat Service Interconnect 1Red Hat OpenShift Dev SpacesRed Hat OpenStack Platform 17.1Red Hat Storage 3Red Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 10OpenShift ServerlessRed Hat OpenShift on AWSNBDE Tang Server
CWE ID-CWE-457
Use of Uninitialized Variable
CVE-2024-4467
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.59%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 15:57
Updated-25 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qemu-kvm: 'qemu-img info' leads to host file read/write

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Advanced Virtualization for RHEL 8.2.1Advanced Virtualization for RHEL 8.4.0.EUSRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat OpenShift Virtualization 4Red Hat Enterprise Linux 8 Advanced VirtualizationRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 9
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-3727
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.3||HIGH
EPSS-0.56% / 67.98%
||
7 Day CHG~0.00%
Published-09 May, 2024 | 14:57
Updated-03 Mar, 2026 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Containers/image: digest type does not guarantee valid type

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 7Red Hat OpenShift Container Platform 4.15Red Hat Openshift Sandboxed ContainersRed Hat Advanced Cluster Security 3Red Hat Ansible Automation Platform 2Red Hat OpenStack Platform 16.2Red Hat OpenShift Container Platform 4.17Red Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4.13Red Hat Advanced Cluster Management for Kubernetes 2OpenShift ServerlessRed Hat OpenShift Dev SpacesRed Hat Advanced Cluster Security 4.4Red Hat Enterprise Linux 8Red Hat Advanced Cluster Security 4.5Multicluster Engine for KubernetesRed Hat OpenShift Container Platform 3.11Red Hat Quay 3Red Hat Migration Toolkit for Containers 1.8OpenShift Source-to-Image (S2I)Red Hat OpenShift Container Platform 4.16Red Hat OpenShift Container Platform 4.14RHEL-9-CNV-4.15Red Hat OpenShift Container Platform 4.18OADP-1.3-RHEL-9Red Hat OpenShift Virtualization 4Red Hat OpenShift Container Platform Assisted Installer 1OpenShift Developer Tools and ServicesRed Hat Ansible Automation Platform 1.2
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2024-31420
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.16%
||
7 Day CHG~0.00%
Published-03 Apr, 2024 | 14:01
Updated-20 Nov, 2025 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cnv: dos through repeatedly calling vm-dump-metrics until virt handler crashes

A NULL pointer dereference flaw was found in KubeVirt. This flaw allows an attacker who has access to a virtual machine guest on a node with DownwardMetrics enabled to cause a denial of service by issuing a high number of calls to vm-dump-metrics --virtio and then deleting the virtual machine.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Virtualization 4
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-31419
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.23% / 45.19%
||
7 Day CHG~0.00%
Published-03 Apr, 2024 | 14:00
Updated-21 Nov, 2025 | 06:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cnv: information disclosure through the usage of vm-dump-metrics

An information disclosure flaw was found in OpenShift Virtualization. The DownwardMetrics feature was introduced to expose host metrics to virtual machine guests and is enabled by default. This issue could expose limited host metrics of a node to any guest in any namespace without being explicitly enabled by an administrator.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Virtualization 4
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-1394
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.02% / 77.05%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 12:16
Updated-04 Mar, 2026 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Golang-fips/openssl: memory leaks in code encrypting and decrypting rsa payloads

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9Red Hat OpenShift Container Platform 4Red Hat OpenStack Platform 17.1Red Hat Enterprise Linux 7Red Hat Storage 3Red Hat OpenShift Container Platform 4.15Red Hat OpenStack Platform 16.1Red Hat OpenStack Platform 17.1 for RHEL 9RHODF-4.16-RHEL-9Red Hat OpenStack Platform 16.2Red Hat OpenShift Container Platform 4.13Red Hat Ansible Automation Platform 2.4 for RHEL 8Red Hat Openshift Container Storage 4NBDE Tang ServerRed Hat Software CollectionsRed Hat Enterprise Linux 9.0 Update Services for SAP SolutionsOpenShift ServerlessOpenShift PipelinesRed Hat OpenShift Dev SpacesRed Hat OpenStack Platform 17.1 for RHEL 8Red Hat Certification for Red Hat Enterprise Linux 8Red Hat Enterprise Linux 8Red Hat OpenStack Platform 18.0Red Hat Service Interconnect 1Red Hat OpenShift Container Platform 4.12Red Hat OpenShift GitOpsRed Hat OpenShift on AWSRed Hat OpenShift Container Platform 4.14Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Developer ToolsRed Hat OpenShift Virtualization 4OpenShift Developer Tools and ServicesRed Hat Ansible Automation Platform 1.2Red Hat Ansible Automation Platform 2.4 for RHEL 9Red Hat Certification Program for Red Hat Enterprise Linux 9
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2023-3089
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 16.25%
||
7 Day CHG~0.00%
Published-05 Jul, 2023 | 12:21
Updated-24 Oct, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ocp & fips mode

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-openshift_container_platform_ibm_z_systemsopenshift_container_platformenterprise_linuxopenshift_container_platform_for_arm64openshift_container_platform_for_poweropenshift_container_platform_for_linuxoneRed Hat JBoss A-MQ StreamsOpenShift Service Mesh 2.4openshiftRed Hat OpenShift Virtualization 4Red Hat Openshift Data Foundation 4Red Hat Advanced Cluster Management for Kubernetes 2OpenShift ServerlessOpenShift Service Mesh 2.2.xRed Hat OpenShift Container Platform 4OpenShift Service Mesh 2.3.xRed Hat OpenShift Container Platform 3.11Red Hat Openshift sandboxed containers
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-521
Weak Password Requirements