Show plain JSON{"id": "CVE-2025-46599", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "cve@mitre.org", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 4.0, "exploitabilityScore": 2.2}]}, "published": "2025-04-25T05:15:33.330", "references": [{"url": "https://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port", "source": "cve@mitre.org"}, {"url": "https://github.com/f1veT/BUG/issues/2", "source": "cve@mitre.org"}, {"url": "https://github.com/k3s-io/k3s/commit/097b63e588e3c844cdf9b967bcd0a69f4fc0aa0a", "source": "cve@mitre.org"}, {"url": "https://github.com/k3s-io/k3s/compare/v1.32.3+k3s1...v1.32.4-rc1+k3s1", "source": "cve@mitre.org"}, {"url": "https://github.com/k3s-io/k3s/issues/12164", "source": "cve@mitre.org"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "cve@mitre.org", "description": [{"lang": "en", "value": "CWE-1188"}]}], "descriptions": [{"lang": "en", "value": "CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials."}, {"lang": "es", "value": "CNCF K3s 1.32 anterior a 1.32.4-rc1+k3s1 tiene un cambio de configuraci\u00f3n de kubelet de Kubernetes con la consecuencia no deseada de que, en algunas situaciones, ReadOnlyPort se establece en 10255. Por ejemplo, el comportamiento predeterminado de una instalaci\u00f3n en l\u00ednea de K3s podr\u00eda permitir el acceso no autenticado a este puerto, exponiendo las credenciales."}], "lastModified": "2025-04-29T13:52:28.490", "sourceIdentifier": "cve@mitre.org"}