{"vulnerability": "CVE-2025-2241", "sightings": [{"uuid": "27f68129-ba40-4efa-a50d-14028c1ae3d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:31.000000Z"}, {"uuid": "367c343d-a78c-4562-865e-e4f62135eeba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkltwytmyc2w", "content": "", "creation_timestamp": "2025-03-17T19:05:50.071285Z"}, {"uuid": "11b97b54-ef1e-40b5-98ea-da6b4dc377a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "3f2cc9af-1dbf-4020-b886-533636ed8840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114179028571344368", "content": "", "creation_timestamp": "2025-03-17T17:48:32.861588Z"}, {"uuid": "7bc1f90d-0280-42a8-ae38-7bb6ffec2062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22411", "type": "seen", "source": "https://gist.github.com/Darkcrai86/a9b95d2e28d792b9a3b28699e4b93876", "content": "", "creation_timestamp": "2025-08-27T06:37:20.000000Z"}, {"uuid": "33b820a4-7742-48fd-bb2b-657b8876c5e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22412", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ca02377d40acfbafc3044d5b9c83e5dd", "content": "", "creation_timestamp": "2025-08-27T06:37:00.000000Z"}, {"uuid": "729478bf-9aa3-4bc8-bc81-0c774115be8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7796", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2241\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.\n\ud83d\udccf Published: 2025-03-17T16:27:20.598Z\n\ud83d\udccf Modified: 2025-03-17T16:27:20.598Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2241\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2351350", "creation_timestamp": "2025-03-17T16:47:33.000000Z"}, {"uuid": "cae2ec95-5e85-40b6-af5d-abea1931075c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17197", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2241\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.\n\ud83d\udccf Published: 2025-03-17T16:27:20.598Z\n\ud83d\udccf Modified: 2025-05-21T20:15:02.904Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2241\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2351350", "creation_timestamp": "2025-05-21T20:41:38.000000Z"}, {"uuid": "c5cf4e8b-0b95-4e57-8ec3-ab1cf761a9f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2241", "type": "seen", "source": "https://t.me/cvedetector/20491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2241 - \"Hive Exposes VCenter Credentials\"\", \n  \"Content\": \"CVE ID : CVE-2025-2241 \nPublished : March 17, 2025, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T19:08:41.000000Z"}]}