{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-2842","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-03-27T02:38:55.497Z","datePublished":"2025-04-02T11:09:55.496Z","dateUpdated":"2026-03-22T03:43:57.833Z"},"containers":{"cna":{"title":"Tempo-operator: tempo operator token exposition lead to read sensitive data","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole.\nThis can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics."}],"affected":[{"versions":[{"status":"affected","version":"0","lessThan":"0.15.3","versionType":"semver"}],"packageName":"tempo-operator","collectionURL":"https://github.com/grafana/tempo-operator","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3.5.1","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhosdt/tempo-rhel8-operator","defaultStatus":"affected","versions":[{"version":"sha256:233132300a9f5f019047a414b240f5b32c7563af8107bb52c4395892fdcd0fe0","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift_distributed_tracing:3.5::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3.5.1","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhosdt/tempo-rhel8-operator","defaultStatus":"affected","versions":[{"version":"sha256:be2ec2e3d3b21748cfe3b9382f7fc1f6c72d5f380fc97773518c254c6e5794ca","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift_distributed_tracing:3.5::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhosdt/tempo-gateway-opa-rhel8","defaultStatus":"affected","cpes":["cpe:/a:redhat:openshift_distributed_tracing:3"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhosdt/tempo-gateway-rhel8","defaultStatus":"affected","cpes":["cpe:/a:redhat:openshift_distributed_tracing:3"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhosdt/tempo-jaeger-query-rhel8","defaultStatus":"affected","cpes":["cpe:/a:redhat:openshift_distributed_tracing:3"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhosdt/tempo-query-rhel8","defaultStatus":"affected","cpes":["cpe:/a:redhat:openshift_distributed_tracing:3"]},{"vendor":"Red Hat","product":"Red Hat OpenShift distributed tracing 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhosdt/tempo-rhel8","defaultStatus":"affected","cpes":["cpe:/a:redhat:openshift_distributed_tracing:3"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:3607","name":"RHSA-2025:3607","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:3740","name":"RHSA-2025:3740","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-2842","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355219","name":"RHBZ#2355219","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/grafana/tempo-operator/pull/1144"}],"datePublic":"2025-03-27T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","workarounds":[{"lang":"en","value":"Currently, no mitigation is available for this vulnerability."}],"timeline":[{"lang":"en","time":"2025-03-27T02:33:13.059Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-03-27T00:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-03-22T03:43:57.833Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-02T13:12:50.601180Z","id":"CVE-2025-2842","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-02T13:25:51.661Z"}}]}}