A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.
Fixes

Solution

No solution given by the vendor.


Workaround

A few mechanisms are available to reduce the risks and mitigate this vulnerability: 1. Restrict Access to ClusterProvision Objects Ensure that only trusted users with valid VCenter credentials have read access to ClusterProvision objects. This can be verified using the following commands: oc adm policy who-can get clusterprovision oc adm policy who-can read clusterprovision 2. Rotate VCenter Credentials Immediately rotate VCenter credentials to revoke access for any users who may have already accessed the exposed credentials. 3. Audit VCenter Users and Roles Conduct a security audit of VCenter accounts and roles to detect any unauthorized access or configuration changes. If any suspicious activity is found, revoke access by rotating credentials again (step 2) and taking necessary remediation actions.

History

Tue, 18 Mar 2025 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 17 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.
Title Hive: exposure of vcenter credentials via clusterprovision in hive / mce / acm
First Time appeared Redhat
Redhat acm
Redhat multicluster Engine
Weaknesses CWE-922
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:multicluster_engine
Vendors & Products Redhat
Redhat acm
Redhat multicluster Engine
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-25T02:43:26.086Z

Reserved: 2025-03-12T04:52:38.166Z

Link: CVE-2025-2241

cve-icon Vulnrichment

Updated: 2025-03-17T17:11:44.332Z

cve-icon NVD

Status : Received

Published: 2025-03-17T17:15:40.393

Modified: 2025-03-17T17:15:40.393

Link: CVE-2025-2241

cve-icon Redhat

Severity : Important

Publid Date: 2025-03-17T15:52:50Z

Links: CVE-2025-2241 - Bugzilla

cve-icon OpenCVE Enrichment

No data.