{"id":"CVE-2025-46599","details":"CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.","aliases":["GHSA-864f-7xjm-2jp2","GO-2025-3646"],"modified":"2026-04-10T05:28:37.666731Z","published":"2025-04-25T05:15:33.330Z","related":["CGA-j875-wr56-cpx9","openSUSE-SU-2025:15059-1"],"references":[{"type":"WEB","url":"https://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port"},{"type":"WEB","url":"https://github.com/k3s-io/k3s/compare/v1.32.3+k3s1...v1.32.4-rc1+k3s1"},{"type":"REPORT","url":"https://github.com/f1veT/BUG/issues/2"},{"type":"REPORT","url":"https://github.com/k3s-io/k3s/issues/12164"},{"type":"FIX","url":"https://github.com/k3s-io/k3s/commit/097b63e588e3c844cdf9b967bcd0a69f4fc0aa0a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/k3s-io/k3s","events":[{"introduced":"0"},{"fixed":"097b63e588e3c844cdf9b967bcd0a69f4fc0aa0a"}]}],"versions":["v0.1.0","v0.1.0-rc1","v0.1.0-rc3","v0.1.0-rc4","v0.1.0-rc5","v0.1.0-rc6","v0.1.0-rc7","v0.1.0-rc8","v0.10.0","v0.10.0-alpha1","v0.10.0-rc1","v0.10.0-rc2","v0.10.1","v0.10.1-rc1","v0.10.2","v0.11.0-alpha1","v0.11.0-alpha2","v0.11.0-alpha3","v0.11.0-alpha4","v0.2.0","v0.2.0-rc3","v0.2.0-rc4","v0.2.0-rc5","v0.2.0-rc6","v0.3.0","v0.3.0-rc1","v0.3.0-rc2","v0.3.0-rc3","v0.3.0-rc4","v0.4.0","v0.4.0-rc1","v0.4.0-rc2","v0.4.0-rc3","v0.5.0","v0.5.0-rc1","v0.5.0-rc2","v0.5.0-rc3","v0.5.0-rc4","v0.6.0","v0.6.0-rc1","v0.6.0-rc2","v0.6.0-rc3","v0.6.0-rc4","v0.6.0-rc5","v0.6.1","v0.7.0","v0.7.0-rc1","v0.7.0-rc2","v0.7.0-rc3","v0.7.0-rc4","v0.7.0-rc5","v0.7.0-rc6","v0.7.0-rc7","v0.7.0-rc8","v0.7.0-rc9","v0.8.0","v0.8.0-rc1","v0.8.1","v0.9.0","v0.9.0-rc1","v0.9.0-rc2","v0.9.1","v0.9.1-rc1","v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.0-rc3","v1.0.0-rc4","v1.0.0-rc5","v1.0.0-rc6","v1.17.0+k3s.1","v1.17.0-rc.1-k3s.1","v1.17.0-rc.2-k3s.1","v1.17.0-rc.3-k3s.1","v1.17.0-rc.4-k3s.1","v1.17.1-alpha1+k3s1","v1.17.1-rc1+k3s1","v1.17.1-rc2+k3s1","v1.17.2+k3s1","v1.17.2-alpha1+k3s1","v1.17.2-alpha2+k3s1","v1.17.2-alpha3+k3s1","v1.18.2+k3s1","v1.18.2-rc1+k3s1","v1.18.2-rc2+k3s1","v1.18.2-rc3+k3s1","v1.18.2-rc4+k3s1","v1.19.1+k3s1","v1.19.1-rc1+k3s1","v1.19.1-rc2+k3s1","v1.20.0+k3s1","v1.20.0+k3s2","v1.20.0-rc1+k3s1","v1.20.0-rc1+k3s2","v1.20.0-rc2+k3s1","v1.20.0-rc3+k3s1","v1.20.0-rc4+k3s1","v1.20.0-rc5+k3s1","v1.20.2+k3s1","v1.20.2-rc1+k3s1","v1.21.0+k3s1","v1.21.0-alpha1+k3s1","v1.21.0-rc1+k3s1","v1.21.1-rc1+k3s1","v1.22.1-rc1+k3s1","v1.22.2-rc1+k3s1","v1.22.2-rc2+k3s1","v1.22.4-rc2+k3s2","v1.23.1+k3s1","v1.23.1+k3s2","v1.23.1-rc1+k3s1","v1.23.1-rc1+k3s2","v1.23.1-rc2+k3s2","v1.23.2+k3s1","v1.23.2-rc1+k3s1","v1.23.3+k3s1","v1.23.3-rc1+k3s1","v1.23.4+k3s1","v1.23.4-rc1+k3s1","v1.23.5+k3s1","v1.23.5-rc1+k3s1","v1.23.5-rc2+k3s1","v1.23.5-rc3+k3s1","v1.23.5-rc4+k3s1","v1.23.5-rc5+k3s1","v1.23.6+k3s1","v1.23.6-rc1+k3s1","v1.23.6-rc2+k3s1","v1.23.6-rc3+k3s1","v1.23.6-rc4+k3s1","v1.24.0-rc1+k3s1","v1.24.1+k3s1","v1.24.1-rc1+k3s1","v1.24.1-rc2+k3s1","v1.24.1-rc3+k3s1","v1.24.1-rc4+k3s1","v1.24.1-rc5+k3s1","v1.24.2+k3s1","v1.24.2+k3s2","v1.24.2-rc1+k3s1","v1.24.2-rc1+k3s2","v1.24.3+k3s1","v1.24.3-rc1+k3s1","v1.24.4+k3s1","v1.24.4-rc1+k3s1","v1.25.0+k3s1","v1.25.0-rc1+k3s1","v1.25.0-rc2+k3s1","v1.25.0-rc3+k3s1","v1.25.1-rc1+k3s1","v1.25.2+k3s1","v1.25.2-rc1+k3s1","v1.25.3+k3s1","v1.25.3-rc1+k3s1","v1.25.3-rc2+k3s1","v1.25.3-rc3+k3s1","v1.25.3-rc4+k3s1","v1.25.4+k3s1","v1.25.4-rc1+k3s1","v1.25.4-rc2+k3s1","v1.25.4-rc3+k3s1","v1.25.4-rc4+k3s1","v1.26.0+k3s1","v1.26.0+k3s2","v1.26.0-rc1+k3s1","v1.26.0-rc1+k3s2","v1.26.0-rc2+k3s1","v1.26.1+k3s1","v1.26.1-rc1+k3s1","v1.26.2+k3s1","v1.26.2-rc1+k3s1","v1.26.3+k3s1","v1.26.3-rc1+k3s1","v1.26.3-rc2+k3s1","v1.26.4+k3s1","v1.26.4-rc1+k3s1","v1.27.1+k3s1","v1.27.1-rc1+k3s1","v1.27.1-rc2+k3s1","v1.27.1-rc3+k3s1","v1.27.2+k3s1","v1.27.2-rc1+k3s1","v1.27.2-rc2+k3s1","v1.27.2-rc3+k3s1","v1.27.3+k3s1","v1.27.3-rc1+k3s1","v1.27.4+k3s1","v1.27.4-rc1+k3s1","v1.27.4-rc2+k3s1","v1.27.4-rc3+k3s1","v1.28.0-rc1+k3s1","v1.28.1+k3s1","v1.28.1-rc1+k3s1","v1.28.1-rc2+k3s1","v1.28.2+k3s1","v1.28.2-rc1+k3s1","v1.28.3+k3s1","v1.28.3+k3s2","v1.28.3-rc1+k3s1","v1.28.3-rc1+k3s2","v1.28.3-rc2+k3s1","v1.28.3-rc2+k3s2","v1.28.3-rc3+k3s2","v1.28.4+k3s1","v1.28.4+k3s2","v1.28.4-rc1+k3s1","v1.28.4-rc1+k3s2","v1.29.0+k3s1","v1.29.0-rc1+k3s1","v1.29.0-rc2+k3s1","v1.29.0-rc3+k3s1","v1.29.1+k3s1","v1.29.1+k3s2","v1.29.1-rc1+k3s1","v1.29.1-rc1+k3s2","v1.29.1-rc2+k3s1","v1.29.1-rc2+k3s2","v1.29.2+k3s1","v1.29.2-rc1+k3s1","v1.29.2-rc2+k3s1","v1.29.2-rc3+k3s1","v1.29.3+k3s1","v1.29.3-rc1+k3s1","v1.29.4+k3s1","v1.29.4-rc1+k3s1","v1.29.4-rc2+k3s1","v1.30.0+k3s1","v1.30.0-rc1+k3s1","v1.30.0-rc2+k3s1","v1.30.1+k3s1","v1.30.1-rc1+k3s1","v1.30.2+k3s1","v1.30.2+k3s2","v1.30.2-rc1+k3s1","v1.30.2-rc1+k3s2","v1.30.2-rc2+k3s1","v1.30.2-rc3+k3s1","v1.31.0-rc1+k3s1","v1.31.2-rc1+k3s1","v1.32.0-rc1+k3s1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"1.32"},{"fixed":"1.32.4-rc1+k3s1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46599.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}]}