{"uuid": "cae2ec95-5e85-40b6-af5d-abea1931075c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17197", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2241\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.\n\ud83d\udccf Published: 2025-03-17T16:27:20.598Z\n\ud83d\udccf Modified: 2025-05-21T20:15:02.904Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2241\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2351350", "creation_timestamp": "2025-05-21T20:41:38.000000Z"}