Description
A vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credentials to local users.
Published: 2026-02-25
Score: 3.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3c9m-gq32-g4jx NeuVector scanner insecurely handles passwords as command arguments
History

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Suse
Suse harvester
Vendors & Products Suse
Suse harvester

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credentials to local users.
Title NeuVector scanner insecurely handles passwords as command arguments
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2026-02-25T21:04:06.294Z

Reserved: 2025-12-12T14:23:59.780Z

Link: CVE-2025-67860

cve-icon Vulnrichment

Updated: 2026-02-25T21:03:53.038Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T11:16:02.820

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-67860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-26T13:18:12Z

Weaknesses