{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2024-9486","title":"Title"},{"category":"description","text":"A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project with its Proxmox provider.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2024-9486","url":"https://www.suse.com/security/cve/CVE-2024-9486"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for SUSE-SU-2024:3911-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2024:0350-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/"},{"category":"external","summary":"Advisory link for openSUSE-SU-2024:14447-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/"}],"title":"SUSE CVE CVE-2024-9486","tracking":{"current_release_date":"2026-03-13T14:50:35Z","generator":{"date":"2024-11-02T04:02:31Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2024-9486","initial_release_date":"2024-11-02T04:02:31Z","revision_history":[{"date":"2024-11-02T04:02:31Z","number":"2","summary":"Current version"},{"date":"2024-11-03T04:04:51Z","number":"3","summary":"Current version"},{"date":"2024-11-04T04:02:44Z","number":"4","summary":"Current version"},{"date":"2024-11-06T04:09:31Z","number":"5","summary":"Current version"},{"date":"2024-11-09T04:11:47Z","number":"6","summary":"Current version"},{"date":"2025-01-01T01:34:50Z","number":"7","summary":"Current version"},{"date":"2025-01-04T01:38:40Z","number":"8","summary":"Current version"},{"date":"2025-02-14T05:36:26Z","number":"9","summary":"Current version"},{"date":"2025-02-16T05:28:04Z","number":"10","summary":"Current version"},{"date":"2025-03-15T05:39:13Z","number":"11","summary":"Current version"},{"date":"2025-04-24T15:29:39Z","number":"12","summary":"Current version"},{"date":"2025-06-17T02:55:02Z","number":"13","summary":"Current version"},{"date":"2025-11-03T02:14:46Z","number":"14","summary":"Current version"},{"date":"2026-01-16T00:47:38Z","number":"15","summary":"unknown changes"},{"date":"2026-03-12T09:05:26Z","number":"16","summary":"unknown changes"},{"date":"2026-03-13T14:50:35Z","number":"17","summary":"unknown changes"}],"status":"interim","version":"17"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 16.0","product":{"name":"SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0","product_identification_helper":{"cpe":"cpe:/o:suse:sles:16:16.0:server"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20241030T212825-1.1","product":{"name":"govulncheck-vulndb-0.0.20241030T212825-1.1","product_id":"govulncheck-vulndb-0.0.20241030T212825-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20241030T212825-1.1?upstream=govulncheck-vulndb-0.0.20241030T212825-1.1.src.rpm"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_id":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250814T182633-160000.1.2?upstream=govulncheck-vulndb-0.0.20250814T182633-160000.1.2.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2 as component of SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2"},"product_reference":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","relates_to_product_reference":"SUSE Linux Enterprise Server 16.0"},{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20241030T212825-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241030T212825-1.1"},"product_reference":"govulncheck-vulndb-0.0.20241030T212825-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2024-9486","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-9486"}],"notes":[{"category":"general","text":"A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project with its Proxmox provider.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241030T212825-1.1"]},"references":[{"category":"external","summary":"CVE-2024-9486","url":"https://www.suse.com/security/cve/CVE-2024-9486"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for SUSE-SU-2024:3911-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2024:0350-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/"},{"category":"external","summary":"Advisory link for openSUSE-SU-2024:14447-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241030T212825-1.1"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241030T212825-1.1"]}],"threats":[{"category":"impact","date":"2024-10-14T16:00:26Z","details":"critical"}],"title":"CVE-2024-9486"}]}