CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
3Description
A flaw was found in the OpenShift Mirror Registry. This vulnerability allows an unauthenticated, remote attacker to enumerate valid usernames and email addresses via different error messages during authentication failures and account creation.
Analysis
OpenShift Mirror Registry leaks valid usernames and email addresses through inconsistent error messages during authentication and account creation, enabling unauthenticated remote attackers to enumerate registered users. CVSS score of 5.3 reflects the low confidentiality impact with no authentication required and low attack complexity; no public exploit code or active exploitation has been confirmed at time of analysis.
Technical Context
The vulnerability stems from CWE-209 (Information Exposure Through an Error Message), a class of flaw where disparate error responses reveal sensitive information. OpenShift Mirror Registry, a Red Hat container image registry component, fails to implement uniform error handling across authentication and account creation endpoints. An attacker can send requests to login and registration endpoints, analyzing response codes, messages, or timing differences to determine whether an email address or username exists in the system. This information disclosure attack requires no authentication (PR:N per CVSS vector) and no special user interaction, making it a low-complexity enumeration vector.
Affected Products
Red Hat Mirror Registry for Red Hat OpenShift versions are impacted, including both the primary product (cpe:2.3:a:red_hat:mirror_registry_for_red_hat_openshift) and version 2 (cpe:2.3:a:red_hat:mirror_registry_for_red_hat_openshift_2). The CPE entries indicate all versions are affected, though exact version ranges with and without the fix are not specified in the available data. Red Hat security advisory CVE-2025-14243 at https://access.redhat.com/security/cve/CVE-2025-14243 and the associated Bugzilla report (https://bugzilla.redhat.com/show_bug.cgi?id=2419829) provide official vendor guidance.
Remediation
Apply the patch released by Red Hat for Mirror Registry. Consult the Red Hat Security Advisory at https://access.redhat.com/security/cve/CVE-2025-14243 and Bugzilla ticket 2419829 for the specific patched version applicable to your deployment. In interim periods, implement rate limiting and monitoring on authentication and account creation endpoints to detect enumeration attempts, and consider network-level access controls restricting these endpoints to trusted networks if operational context permits. Upgrade to the patched version as soon as testing and deployment windows allow.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209308
GHSA-v9gq-365f-qxxw