{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-8077","title":"Title"},{"category":"description","text":"A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-8077","url":"https://www.suse.com/security/cve/CVE-2025-8077"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1247840 for CVE-2025-8077","url":"https://bugzilla.suse.com/1247840"},{"category":"external","summary":"Advisory link for GHSA-8pxw-9c75-6w56","url":"https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56"}],"title":"SUSE CVE CVE-2025-8077","tracking":{"current_release_date":"2025-09-17T23:25:24Z","generator":{"date":"2025-08-26T23:25:56Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-8077","initial_release_date":"2025-08-26T23:25:56Z","revision_history":[{"date":"2025-08-26T23:25:56Z","number":"2","summary":"Current version"},{"date":"2025-09-10T23:27:21Z","number":"3","summary":"Current version"},{"date":"2025-09-17T23:25:24Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250908T141310-1.1","product":{"name":"govulncheck-vulndb-0.0.20250908T141310-1.1","product_id":"govulncheck-vulndb-0.0.20250908T141310-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250908T141310-1.1?upstream=govulncheck-vulndb-0.0.20250908T141310-1.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250908T141310-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250908T141310-1.1"},"product_reference":"govulncheck-vulndb-0.0.20250908T141310-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-8077","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-8077"}],"notes":[{"category":"general","text":"A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250908T141310-1.1"]},"references":[{"category":"external","summary":"CVE-2025-8077","url":"https://www.suse.com/security/cve/CVE-2025-8077"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1247840 for CVE-2025-8077","url":"https://bugzilla.suse.com/1247840"},{"category":"external","summary":"Advisory link for GHSA-8pxw-9c75-6w56","url":"https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250908T141310-1.1"]}],"threats":[{"category":"impact","date":"2025-08-08T13:54:15Z","details":"critical"}],"title":"CVE-2025-8077"}]}