podman: Podman machine init TLS certificate verification bypass (CVE-2025-6032) #shorts
Summary
Welcome to PodSec Weekly. Today we’re discussing CVE-2025-6032, a certificate validation flaw in Podman that can enable man-in-the-middle attacks when initializing container VMs.
Product details
The issue affects Podman’s machine init command across multiple Linux distributions, including SUSE and Red Hat variants. SUSE has released an important security update addressing this flaw in its podman package.
Vulnerability type summary
CVE-2025-6032 is classified as Improper Certificate Validation. It occurs when Podman fails to verify TLS certificates while downloading VM images from an OCI registry.
Details of the vulnerability
When you run podman machine init to pull a virtual machine image, Podman does not check the authenticity of the TLS certificate presented by the registry. An attacker positioned between your host and the registry could intercept the download, serve a malicious image, and compromise your container environment. The defect stems from missing or bypassed certificate checks in the machine initialization code.
Conclusion
If you use Podman machine init, update to the patched version provided by SUSE (and other vendors) immediately. Verifying TLS certificates is critical to preventing MITM attacks. That’s all for today’s episode of PodSec Weekly—stay secure and see you next time.
Watch the full video on YouTube: CVE-2025-6032
Remediation and exploitation details
This chain involves the following actors
- Network attacker: Performs man-in-the-middle interception on network traffic
- Podman user: Invokes podman machine init to download virtual machine images
This following systems are involved
- Podman (Container and virtual machine management): Downloads VM images via the machine init command
- OCI registry (Hosts virtual machine images): Serves image data over Transport Layer Security
Attack entry point
- Unverified TLS connection: podman machine init does not verify the certificate presented by the registry
- Network path: Attacker inserts into the path between Podman and the registry
Remediation actions
Exploitation actions
Man-in-the-middle interception
- Use ARP poisoning or DNS spoofing to redirect traffic through attacker-controlled proxy
Certificate forgery
- Generate a certificate with attacker-controlled private key and serve it in place of the registry certificate
Blind acceptance of forged certificate
- podman machine init --image ociregistry.local/myvm:latest
Binary tampering
- Inject backdoor binary or altered loader into the downloaded image stream
Execution of tampered code
- podman machine start, leading to execution of injected malware within the VM
Related Content
NOTE: The following related content has not been vetted and may be unsafe.
- https://access.redhat.com/errata/RHSA-2025:10295
- https://access.redhat.com/errata/RHSA-2025:10549
- https://access.redhat.com/errata/RHSA-2025:10550
- https://access.redhat.com/errata/RHSA-2025:10551
- https://access.redhat.com/errata/RHSA-2025:10668
- https://access.redhat.com/errata/RHSA-2025:11363
- https://access.redhat.com/errata/RHSA-2025:11677
- https://access.redhat.com/errata/RHSA-2025:11681
- https://access.redhat.com/errata/RHSA-2025:9726
- https://access.redhat.com/errata/RHSA-2025:9751
- https://access.redhat.com/errata/RHSA-2025:9766
- https://access.redhat.com/security/cve/CVE-2025-6032
- https://bugzilla.redhat.com/show_bug.cgi?id=2372501
- [2025-08-16] SUSE releases an important security update for Podman addressing a vulnerability with cross-reference CVE-2025-6032.
- [2025-08-16] SUSE releases an important security advisory for podman, referencing CVE-2025-6032.
- [2025-08-16] SUSE releases an important security advisory for podman, addressing CVE-2025-6032.