7.5
HIGH CVSS 3.1
CVE-2025-7342
VM images built with Kubernetes Image Builder Nutanix or OVA providers use default credentials for Windows images if user did not override
Description

A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress.

INFO

Published Date :

Aug. 17, 2025, 11:15 p.m.

Last Modified :

Aug. 20, 2025, 1:15 a.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-7342 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Kubernetes image_builder
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
Solution
Disable default credentials in image builds and update the Kubernetes Image Builder.
  • Ensure default credentials are not enabled during Windows image builds.
  • Update Kubernetes Image Builder to the latest version.
  • Review build logs for suspicious activity.
  • Rebuild VM images using secure configurations.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-7342.

URL Resource
https://github.com/kubernetes/kubernetes/issues/133115
https://groups.google.com/g/kubernetes-security-announce/c/tuEsLUQu_PA
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-7342 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-7342 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-7342 vulnerability anywhere in the article.

  • TheCyberThrone
Storm-2603 Exploiting SharePoint Flaws

July 24, 2025OverviewStorm-2603 is a China-based advanced threat actor actively exploiting a series of critical vulnerabilities in on-premises Microsoft SharePoint servers since mid-2025. Their attack ... Read more

Published Date: Jul 24, 2025 (1 month, 2 weeks ago)

The following table lists the changes that have been made to the CVE-2025-7342 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Aug. 20, 2025

    Action Type Old Value New Value
    Changed Description A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process. Additionally, virtual machine images built using the Nutanix or the OVA provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their Windows nodes use VM images created via the Image Builder project with its Nutanix or OVA provider. A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress.
  • New CVE Received by [email protected]

    Aug. 17, 2025

    Action Type Old Value New Value
    Added Description A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process. Additionally, virtual machine images built using the Nutanix or the OVA provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their Windows nodes use VM images created via the Image Builder project with its Nutanix or OVA provider.
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-798
    Added Reference https://github.com/kubernetes/kubernetes/issues/133115
    Added Reference https://groups.google.com/g/kubernetes-security-announce/c/tuEsLUQu_PA
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact