A flaw was found in kubevirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system's ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI). This allows the VM user to restrict the VM administrator's ability to manage the VM, leading to a denial of service for administrative operations.
Metrics
Affected Vendors & Products
References
History
Mon, 26 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in kubevirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system's ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI). This allows the VM user to restrict the VM administrator's ability to manage the VM, leading to a denial of service for administrative operations. |
| Title | kubevirt: kubevirt: VM administration denial of service via guest agent | Kubevirt: kubevirt: vm administration denial of service via guest agent |
| First Time appeared |
Redhat
Redhat container Native Virtualization |
|
| CPEs | cpe:/a:redhat:container_native_virtualization:4 | |
| Vendors & Products |
Redhat
Redhat container Native Virtualization |
|
| References |
|
Sat, 10 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | kubevirt: kubevirt: VM administration denial of service via guest agent | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-01-26T19:36:43.721Z
Updated: 2026-01-26T20:59:41.777Z
Reserved: 2025-12-11T08:19:47.528Z
Link: CVE-2025-14525
Updated: 2026-01-26T20:59:37.910Z
Status : Received
Published: 2026-01-26T20:16:08.163
Modified: 2026-01-26T20:16:08.163
Link: CVE-2025-14525