Bug 2433784 (CVE-2026-1530) - CVE-2026-1530 fog-kubevirt: fog-kubevirt: Man-in-the-Middle vulnerability due to disabled certificate validation
Summary: CVE-2026-1530 fog-kubevirt: fog-kubevirt: Man-in-the-Middle vulnerability due...
Keywords:
Status: NEW
Alias: CVE-2026-1530
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-28 12:42 UTC by OSIDB Bzimport
Modified: 2026-02-02 05:43 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-28 12:42:02 UTC
Summary: MITM in fog-kubevirt due disabled certificate validation

Requirements to exploit: Being able to MITM traffic between Satellite
and OpenShift

Component affected: https://github.com/fog/fog-kubevirt

Version affected: <= 1.5.0

Patch available: no

Version fixed (if any already): none

CVSS (optional): N/A

Impact (optional): Important

Embargo: No

Reason: The amount of affected systems should be low
Suggested public date: dd-MMM-yyyy

Acknowledgement: Evgeni Golov

Steps to reproduce if available:

Configure OpenShift Virtualization / KubeVirt in Satellite with
any CA cert provided
See that connections succeed, even if the CA is wrong
Mitigation if available: None

Original report: this email

When foreman_kubevirt sets up a new client, it passes in the CA
provided in the UI to Fog::Kubevirt::Compute [1].
This CA (and the boolean whether SSL verification should happen at
all), is then used in `obtain_ssl_options` to prepare the SSL options
for `kubeclient` [2][3].
However, when the client is actually created, `@opts` is overridden
and contains `verify_ssl => OpenSSL::SSL::VERIFY_NONE` [4].


Note You need to log in before you can comment on or make changes to this bug.