Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/harvester/harvester-installer
  4. ›
  5. CVE-2025-62877

CVE-2025-62877: Harvest May Expose OS Default SSH Login Password Via SUSE Virtualization Interactive Installer

January 5, 2026 (updated January 8, 2026)

Projects using the SUSE Virtualization (Harvester) environment are vulnerable to this exploit if they are using the 1.5.x or 1.6.x interactive installer to either create a new cluster or add new hosts to an existing cluster. The environment is not affected if the PXE boot mechanism is utilized along with the [Harvester configuration](https://docs.harvesterhci. io/v1.7/install/harvester-configuration) setup.

A critical vulnerability has been identified within the SUSE Virtualization interactive installer. This vulnerability allows an attacker to gain unauthorized network access to the host via a remote shell (SSH).

The SUSE Virtualization operating system includes a default administrative login credential intended solely for out-of-band cluster management tasks (for example, perform troubleshooting, device management and system recovery over serial ports). When the interactive installer is used to create or expand a cluster, the installer enables the host’s networking functions before the default password is reset. This presents a window of opportunity for an attacker to exploit the default password to gain unauthorized access to the host via SSH.

Please consult the associated MITRE ATT&CK - Technique - Default Credentials for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2025-62877
  • github.com/advisories/GHSA-6g8q-hp2j-gvwv
  • github.com/harvester/harvester
  • github.com/harvester/harvester/security/advisories/GHSA-6g8q-hp2j-gvwv
  • nvd.nist.gov/vuln/detail/CVE-2025-62877

Code Behaviors & Features

Detect and mitigate CVE-2025-62877 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.5.0 up to 1.5.2, all versions starting from 1.6.0 up to 1.6.1

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1188: Initialization of a Resource with an Insecure Default

Source file

go/github.com/harvester/harvester-installer/CVE-2025-62877.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:01 +0000.