CVE-2025-8077
Wolfi vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2025-8077) has been identified in NeuVector versions up to and including 5.4.5, with a CVSS score of 9.8. The vulnerability stems from the use of a fixed string as the default password for the built-in admin account in this open-source container security platform integrated with Rancher. The flaw was discovered and disclosed in September 2025, affecting all NeuVector deployments that haven't changed their default administrative credentials (GitHub Advisory, Security Online).

Technical details

The vulnerability exists due to a hardcoded default password mechanism in the admin account. When NeuVector fails to retrieve the bootstrap password from the Kubernetes Secret (neuvector-bootstrap-secret), it falls back to using a fixed default password. This implementation allows any workload with network access within the cluster to use these default credentials to obtain an authentication token, which can then be used to perform administrative operations through NeuVector APIs (GitHub Advisory, Debian Security).

Impact

The exploitation of this vulnerability could lead to a full compromise of Kubernetes clusters. An attacker who successfully obtains the authentication token can perform any administrative operation, effectively taking control of the security platform and undermining protections across the entire Kubernetes environment (Security Online).

Mitigation and workarounds

The vulnerability has been patched in NeuVector version 5.4.6 and later releases. The fix introduces new Kubernetes RBAC permissions to ensure bootstrap passwords are securely managed through Secrets. For organizations running vulnerable versions, immediate manual intervention is required by logging into the NeuVector UI after deployment and updating the default admin password. The patched version also implements automatic secure password generation if bootstrapPassword is not set in the neuvector-bootstrap-secret (GitHub Advisory, Security Online).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22863CRITICAL9.2
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-22864HIGH8.1
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-1002MEDIUM6.9
  • JavaJava
  • pki-resteasy-client
NoYesJan 15, 2026
CVE-2026-22045MEDIUM5.9
  • WolfiWolfi
  • traefik
NoYesJan 15, 2026
CVE-2026-0915N/AN/A
  • WolfiWolfi
  • glibc-langpack-ak
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management